Deck 3: Evolution and Applications of the Internet

Full screen (f)
exit full mode
Question
A firewall:

A) encrypts data and sends it over an access line to the company's internet service provider.
B) is a high-security computer system that acts as the entry point into a network.
C) can render the data unreadable by authorized persons.
D) protects systems primarily against outside problems.
E) all of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
The following are a number of internet facts. Which one is incorrect?

A) A URL is an unsecure relay location that should be avoided.
B) The internet is structured in a complex client-server fashion.
C) The key protocol of the internet is TCP/IP.
D) The World Wide Web is only part of the internet.
E) An internet backbone links various regions and service providers.
Question
Virtual private networks:

A) use wireless communication to build a private internet.
B) link all points on the internet.
C) link individual consumers to their ISP.
D) provide streaming video presentations across the web.
E) allow information to be passed securely between two points.
Question
The Internet Engineering Task Force (IETF) does which of the following?

A) helps coordinate the operation, management, and evolution of the internet
B) promotes research in networking
C) promotes the development of new technology
D) develops routers for the internet
E) all of the above
Question
Virtual private networks (VPN):

A) are secure but unencrypted connections between two points across the internet.
B) transfer information by encrypting the data in IP packets and send the packets by tunnelling.
C) will increase the businesses networking costs and staffing requirements.
D) do not use the internet.
E) none of the above
Question
Websites are identified by a URL, which contains:

A) a web server identifier.
B) a domain name.
C) the name of a protocol.
D) a file name sometimes.
E) all of the above
Question
The following is a good example of web technologies allowing businesses to do what would otherwise be impossible:

A) remote locations can be linked into head office in real time
B) partners can be updated on supply chain issues
C) data can be communicated rapidly and cost-effectively
D) the geographic region for sales can be expanded
E) all of the above
Question
Which of the following statements best describes extranets?

A) Extranets have all of the advantages of intranets.
B) Extranets are networks that are available to users outside of a company.
C) Extranets are more secure than intranets.
D) Extranets can make it difficult for an employee to deal with inquiries about product availability and delivery times.
E) all of the above
Question
A business may choose to implement a virtual private network if:

A) it often sends confidential information to business partners.
B) it has multiple locations that are linked electronically.
C) remote salespeople often connect to head office.
D) it tries to reduce communications costs.
E) all of the above
Question
Which of the following is true about intranets?

A) They take control away from employees because they are not able to input information into corporate applications.
B) Intranets are internal to an organization and uses internet technologies.
C) Intranets are taking market share away from extranets.
D) Intranets are used to connect mainframe computers.
E) all of the above
Question
Which statement is true of fibre optics?

A) CA*net 1 was based on fibre optic technology.
B) It is the transmission of information as light impulses along a glass or plastic fibre.
C) Copper media carries more data than fibre optic media.
D) Due to its sensitivity it is more subject to electromagnetic interference.
E) all of the above
Question
Extensible markup language:

A) was one of the first languages used on the internet.
B) is a means of distributing music across the internet.
C) categorizes websites according to their industry.
D) converts web transactions into emails.
E) adds additional descriptions to websites.
Question
When referring to the internet, tunnelling is:

A) the use of a mathematical formula to render electronic data illegible.
B) a trick used by hackers to get beyond a firewall.
C) the process of uploading new web pages to the internet.
D) the process of sending data in encapsulations.
E) none of the above
Question
The internet can use a tool called common gateway interface to:

A) ensure all customers see the same view of a website.
B) allow wireless phones to tap into the internet.
C) capture user information and record it as cookies.
D) bridge the gap between the web and other systems.
E) bridge the gap between the web and the wireless web.
Question
Domain names on the internet:

A) are part of the URL.
B) identify a specific web server.
C) are used to navigate the internet.
D) follow a specific protocol.
E) all of the above
Question
Which of the following is true about an internet backbone?

A) often based on fibre optic cables
B) CA*net was the only internet backbone in Canada for years
C) is an organized and managed communications system
D) forms the central connection for a section of the internet
E) all of the above
Question
__________ is a code that must be inserted in a file in order for it to be displayed on the World Wide Web.

A) Extensible Markup Language
B) Hypertext Markup Language
C) source code
D) metatags
E) Common Gateway Interface
Question
The key difference between intranets and extranets is:

A) the technologies that enable them.
B) intranets are primarily within companies while extranets are outside.
C) users have to type more commands on extranets.
D) the internet cannot be linked to intranets.
E) none of the above
Question
Of the following statements, which is correct about the Internet Research Task Force (IRTF)?

A) The activities of the IETF and the IRTF are distinct and seldom overlap.
B) The IRTF helps to coordinate the operation, management, and evolution of the internet.
C) The IRTF is responsible for specifying the short- and mid-term internet protocols.
D) The IRTF was formed to promote research in networking and the development of new technology.
E) The IRTF is a centralized research organization.
Question
The source code for an internet web page:

A) is protected from being seen by users.
B) tells trade secrets about a company.
C) is most often written in HTML.
D) needs to be compiled before it is published.
E) none of the above
Question
Extensible Markup Language (XML) describes the content only in terms of how it is to be displayed and interacted with, whereas the Hypertext Markup Language (HTML) describes the content in terms of what data is being included.
Question
VPN stands for Virtual Protocol Network.
Question
Common Gateway Interface is a proprietary method for transferring data between servers and applications.
Question
Software with a user-friendly, graphics-cable interface that enables users to connect to and navigate websites on the internet is called:

A) Graphical User Interface.
B) a web browser.
C) HTML.
D) windows media.
E) TCP/IP.
Question
Internet technology is attractive to business because:

A) it is easy to implement on almost any technology platform.
B) it is completely free.
C) every country in the world has the internet.
D) it is secure.
E) online transactions are not taxed.
Question
In Canada, the internet began in earnest when the following was created:

A) Asynchronous Transfer Mode (ATM)
B) CA*net
C) AT&T
D) Regional Advanced Networks (RANs)
E) CA*net II
Question
What kind of software applications were used to find and retrieve information when the internet was first implemented?

A) Gopher and Veronica
B) FTP
C) TCP/IP
D) Netscape Communicator
E) Mosaic
Question
An internet service provider has at least one point of presence on the internet.
Question
A prime purpose of the use of intranets and extranets is to:

A) interact seamlessly with the internet.
B) automate and streamline the supply chain.
C) save printing costs.
D) enable employees to work from home.
E) monitor company inventory.
Question
Metatags are identifiers within the XML code that identify the content of the website.
Question
A point of presence (POP) is an access point to the internet that has a unique IP address.
Question
The following organizations are important contributors to the development activities of the internet on an international scale:

A) Canadian Radio-television Telecommunications Commission (CRTC) and Internet Architecture Board (IAB)
B) Internet Engineering Task Force (IETF) and Internet Research Task Force (IRTF)
C) Defense Advanced Research Projects Agency (DARPA) and National Test Network (NTN)
D) Federal Networking Council (FNC) and World Wide International (WWI)
E) National Research Council (NRC) and the U.S. Defense Communications Agency
Question
Top-level domain names include all except the following ________.

A) .com
B) .org
C) .edu
D) .bus
E) .net
Question
Sympatico and Interlink are examples of:

A) servers.
B) Internet Service Providers (ISP).
C) Internet Research Task Force (IRTF) members.
D) Internet Engineering Task Force (IETF) members.
E) none of the above
Question
The difference between Transmission Control Protocol (TCP) and Internet Protocol (IP) is that TCP uses a set of rules to send and receive messages and IP uses a set of rules to exchange messages.
Question
By far the most common protocol used for reading webpages on the web is ________.

A) HTTP
B) HTML
C) XML
D) CGI
E) VPN
Question
Websites or applications that combine content from simple existing web services to create a new service are called ________.

A) wikis
B) blogs
C) web logs
D) social networks
E) mashups
Question
Gigabits per second (Gbps) means a million bits per second.
Question
A virtual private network is a secure and encrypted connection between two points across the internet.
Question
An intranet appears to users to be the same as the internet since it uses the same protocols such as TCP/IP.
Question
What is the key feature described in this chapter that distinguishes the internet from other mass media such as radio, television and newspapers?
Question
How does the Virtual Private Network (VPN) transfer information?
Question
The most important internet application continues to be electronic, or email.
Question
Provide an example of a joint application used by suppliers which would be considered an extension of extranets. Explain its use.
Question
What is tunnelling?
Question
All websites are not created equal. List five key quality indicators of a website.
Question
Who builds and runs most Virtual Networks (VPNs)? And what kind of networks have VPNs been used to replace?
Question
Describe how email as an application can be the basis for adding valuable services opportunities for businesses.
Question
The internet is a network of loosely connected networks.
Question
Due to its universality, the internet reduces barriers to competition created by space, time, and information asymmetries. Explain.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Evolution and Applications of the Internet
1
A firewall:

A) encrypts data and sends it over an access line to the company's internet service provider.
B) is a high-security computer system that acts as the entry point into a network.
C) can render the data unreadable by authorized persons.
D) protects systems primarily against outside problems.
E) all of the above
all of the above
2
The following are a number of internet facts. Which one is incorrect?

A) A URL is an unsecure relay location that should be avoided.
B) The internet is structured in a complex client-server fashion.
C) The key protocol of the internet is TCP/IP.
D) The World Wide Web is only part of the internet.
E) An internet backbone links various regions and service providers.
A URL is an unsecure relay location that should be avoided.
3
Virtual private networks:

A) use wireless communication to build a private internet.
B) link all points on the internet.
C) link individual consumers to their ISP.
D) provide streaming video presentations across the web.
E) allow information to be passed securely between two points.
allow information to be passed securely between two points.
4
The Internet Engineering Task Force (IETF) does which of the following?

A) helps coordinate the operation, management, and evolution of the internet
B) promotes research in networking
C) promotes the development of new technology
D) develops routers for the internet
E) all of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Virtual private networks (VPN):

A) are secure but unencrypted connections between two points across the internet.
B) transfer information by encrypting the data in IP packets and send the packets by tunnelling.
C) will increase the businesses networking costs and staffing requirements.
D) do not use the internet.
E) none of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Websites are identified by a URL, which contains:

A) a web server identifier.
B) a domain name.
C) the name of a protocol.
D) a file name sometimes.
E) all of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
The following is a good example of web technologies allowing businesses to do what would otherwise be impossible:

A) remote locations can be linked into head office in real time
B) partners can be updated on supply chain issues
C) data can be communicated rapidly and cost-effectively
D) the geographic region for sales can be expanded
E) all of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following statements best describes extranets?

A) Extranets have all of the advantages of intranets.
B) Extranets are networks that are available to users outside of a company.
C) Extranets are more secure than intranets.
D) Extranets can make it difficult for an employee to deal with inquiries about product availability and delivery times.
E) all of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
A business may choose to implement a virtual private network if:

A) it often sends confidential information to business partners.
B) it has multiple locations that are linked electronically.
C) remote salespeople often connect to head office.
D) it tries to reduce communications costs.
E) all of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is true about intranets?

A) They take control away from employees because they are not able to input information into corporate applications.
B) Intranets are internal to an organization and uses internet technologies.
C) Intranets are taking market share away from extranets.
D) Intranets are used to connect mainframe computers.
E) all of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Which statement is true of fibre optics?

A) CA*net 1 was based on fibre optic technology.
B) It is the transmission of information as light impulses along a glass or plastic fibre.
C) Copper media carries more data than fibre optic media.
D) Due to its sensitivity it is more subject to electromagnetic interference.
E) all of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Extensible markup language:

A) was one of the first languages used on the internet.
B) is a means of distributing music across the internet.
C) categorizes websites according to their industry.
D) converts web transactions into emails.
E) adds additional descriptions to websites.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
When referring to the internet, tunnelling is:

A) the use of a mathematical formula to render electronic data illegible.
B) a trick used by hackers to get beyond a firewall.
C) the process of uploading new web pages to the internet.
D) the process of sending data in encapsulations.
E) none of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
The internet can use a tool called common gateway interface to:

A) ensure all customers see the same view of a website.
B) allow wireless phones to tap into the internet.
C) capture user information and record it as cookies.
D) bridge the gap between the web and other systems.
E) bridge the gap between the web and the wireless web.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Domain names on the internet:

A) are part of the URL.
B) identify a specific web server.
C) are used to navigate the internet.
D) follow a specific protocol.
E) all of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is true about an internet backbone?

A) often based on fibre optic cables
B) CA*net was the only internet backbone in Canada for years
C) is an organized and managed communications system
D) forms the central connection for a section of the internet
E) all of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
__________ is a code that must be inserted in a file in order for it to be displayed on the World Wide Web.

A) Extensible Markup Language
B) Hypertext Markup Language
C) source code
D) metatags
E) Common Gateway Interface
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
The key difference between intranets and extranets is:

A) the technologies that enable them.
B) intranets are primarily within companies while extranets are outside.
C) users have to type more commands on extranets.
D) the internet cannot be linked to intranets.
E) none of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Of the following statements, which is correct about the Internet Research Task Force (IRTF)?

A) The activities of the IETF and the IRTF are distinct and seldom overlap.
B) The IRTF helps to coordinate the operation, management, and evolution of the internet.
C) The IRTF is responsible for specifying the short- and mid-term internet protocols.
D) The IRTF was formed to promote research in networking and the development of new technology.
E) The IRTF is a centralized research organization.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
The source code for an internet web page:

A) is protected from being seen by users.
B) tells trade secrets about a company.
C) is most often written in HTML.
D) needs to be compiled before it is published.
E) none of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Extensible Markup Language (XML) describes the content only in terms of how it is to be displayed and interacted with, whereas the Hypertext Markup Language (HTML) describes the content in terms of what data is being included.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
VPN stands for Virtual Protocol Network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Common Gateway Interface is a proprietary method for transferring data between servers and applications.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Software with a user-friendly, graphics-cable interface that enables users to connect to and navigate websites on the internet is called:

A) Graphical User Interface.
B) a web browser.
C) HTML.
D) windows media.
E) TCP/IP.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Internet technology is attractive to business because:

A) it is easy to implement on almost any technology platform.
B) it is completely free.
C) every country in the world has the internet.
D) it is secure.
E) online transactions are not taxed.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
In Canada, the internet began in earnest when the following was created:

A) Asynchronous Transfer Mode (ATM)
B) CA*net
C) AT&T
D) Regional Advanced Networks (RANs)
E) CA*net II
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
What kind of software applications were used to find and retrieve information when the internet was first implemented?

A) Gopher and Veronica
B) FTP
C) TCP/IP
D) Netscape Communicator
E) Mosaic
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
An internet service provider has at least one point of presence on the internet.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
A prime purpose of the use of intranets and extranets is to:

A) interact seamlessly with the internet.
B) automate and streamline the supply chain.
C) save printing costs.
D) enable employees to work from home.
E) monitor company inventory.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Metatags are identifiers within the XML code that identify the content of the website.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
A point of presence (POP) is an access point to the internet that has a unique IP address.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
The following organizations are important contributors to the development activities of the internet on an international scale:

A) Canadian Radio-television Telecommunications Commission (CRTC) and Internet Architecture Board (IAB)
B) Internet Engineering Task Force (IETF) and Internet Research Task Force (IRTF)
C) Defense Advanced Research Projects Agency (DARPA) and National Test Network (NTN)
D) Federal Networking Council (FNC) and World Wide International (WWI)
E) National Research Council (NRC) and the U.S. Defense Communications Agency
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Top-level domain names include all except the following ________.

A) .com
B) .org
C) .edu
D) .bus
E) .net
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Sympatico and Interlink are examples of:

A) servers.
B) Internet Service Providers (ISP).
C) Internet Research Task Force (IRTF) members.
D) Internet Engineering Task Force (IETF) members.
E) none of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
The difference between Transmission Control Protocol (TCP) and Internet Protocol (IP) is that TCP uses a set of rules to send and receive messages and IP uses a set of rules to exchange messages.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
By far the most common protocol used for reading webpages on the web is ________.

A) HTTP
B) HTML
C) XML
D) CGI
E) VPN
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Websites or applications that combine content from simple existing web services to create a new service are called ________.

A) wikis
B) blogs
C) web logs
D) social networks
E) mashups
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Gigabits per second (Gbps) means a million bits per second.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
A virtual private network is a secure and encrypted connection between two points across the internet.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
An intranet appears to users to be the same as the internet since it uses the same protocols such as TCP/IP.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What is the key feature described in this chapter that distinguishes the internet from other mass media such as radio, television and newspapers?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
How does the Virtual Private Network (VPN) transfer information?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
The most important internet application continues to be electronic, or email.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Provide an example of a joint application used by suppliers which would be considered an extension of extranets. Explain its use.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What is tunnelling?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
All websites are not created equal. List five key quality indicators of a website.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Who builds and runs most Virtual Networks (VPNs)? And what kind of networks have VPNs been used to replace?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Describe how email as an application can be the basis for adding valuable services opportunities for businesses.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
The internet is a network of loosely connected networks.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Due to its universality, the internet reduces barriers to competition created by space, time, and information asymmetries. Explain.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.