Chapter 13 - Behind the Scenes: How the Internet Works Flashcards

1
Q
The \_\_\_\_\_\_\_\_ is responsible for the Internet's domain name system and the allocation of IP addresses.
A) ISOC
B) ICANN
C) W3C
D) IAB
A

B) ICANN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
The main path of the Internet along which data travels the fastest is known as the Internet \_\_\_\_\_\_\_\_.
A) protocol
B) highway
C) backbone
D) cache
A

C) backbone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
High-speed \_\_\_\_\_\_\_\_ communication lines use fiber-optics.
A) IP
B) OC
C) DSL
D) cable
A

B) OC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Individual Internet users connect to ISPs through a(n) \_\_\_\_\_\_\_\_.
A) User Datagram Protocol (UDP)
B) T line
C) optical carrier (OC) line
D) point of presence (POP)
A

D) point of presence (POP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
The main suite of protocols used on the Internet is \_\_\_\_\_\_\_\_.
A) FTP
B) TCP/IP
C) SMTP
D) POP
A

B) TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
\_\_\_\_\_\_\_\_ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.
A) Packet switching
B) An open circuit
C) Circuit switching
D) A closed circuit
A

C) Circuit switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following information is NOT contained in a packet?
A) The size (in bytes) of the packet
B) The address to which the packet is sent
C) The address from where the packet originates
D) The data that are transmitted

A

A) The size (in bytes) of the packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A(n) \_\_\_\_\_\_\_\_ address is a temporary IP address that is assigned from an available pool of IP addresses.
A) dynamic
B) static
C) assigned
D) transition
A

A) dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
An IP address that does not change and is usually assigned manually by a network administrator is called a \_\_\_\_\_\_\_\_ address.
A) dynamic
B) static
C) fixed
D) stationary
A

B) static

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
IPV6 was introduced when IPV4 \_\_\_\_\_\_\_\_.
A) became too old
B) was eliminated
C) no longer had enough unique addresses
D) was revoked
A

C) no longer had enough unique addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n) \_\_\_\_\_\_\_\_ server.
A) DNS
B) URL
C) FTP
D) XML
A

A) DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
An IP address in the form 197.169.100.1 is called a(n) \_\_\_\_\_\_\_\_.
A) sequential access number
B) dotted quad
C) encryption key
D) random number
A

B) dotted quad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
In http://www.pearsonhighered.com, which of the following is the top-level domain?
A) http
B) www
C) pearsonhighered
D) com
A

D) com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following is NOT used in developing websites?
A) XML
B) KML
C) DHTML
D) HTML
A

B) KML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which of the following was created for the transfer of hypertext documents across the Internet?
A) SSL
B) HTTP
C) FTP
D) HTML
A

B) HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
<b> is an example of an HTML \_\_\_\_\_\_\_\_.
A) marker
B) tag
C) indicator
D) key
</b>
A

B) tag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
\_\_\_\_\_\_\_\_ defines the content in terms of the data that is being described rather than how it is to be displayed.
A) CGI
B) JavaScript
C) XML
D) HTML
A

C) XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
\_\_\_\_\_\_\_\_ enables interactive functionality beyond the simple display of information on a web page by providing a platform which can execute a program to do things like collect data from the user.
A) OC
B) ACK
C) UDP
D) CGI
A

D) CGI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
A(n) \_\_\_\_\_\_\_\_ is a small program that resides on a server and is designed to be downloaded and run on a client computer.
A) CGI script 
B) app
C) applet 
D) JavaScript
A

C) applet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
The \_\_\_\_\_\_\_\_ defines items on a web page such as graphics, tables, and headers as objects.
A) SSL
B) MIME
C) JSON 
D) DOM
A

D) DOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which protocol is used when sending files as attachments by e-mail?
A) Multipurpose Internet Mail Extensions (MIME)
B) Post Office Protocol (POP)
C) Simple Mail Transfer Protocol (SMTP)
D) User Datagram Protocol (UDP)

A

A) Multipurpose Internet Mail Extensions (MIME)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
In public-key encryption, the two keys—one for coding and one for decoding—are known as \_\_\_\_\_\_\_\_.
A) code keys
B) linked keys
C) key tags
D) a key pair
A

D) a key pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
Strong encryption now requires \_\_\_\_\_\_\_\_-bit keys.
A) 40
B) 128
C) 256
D) 512
A

C) 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

________ is a consortium of organizations that develops web protocols and sets standards.

A

W3C - World Wide Web Consortium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A typical ________ is made up of one or more network switches to which ISPs connect.

A

IXP - Internet Exchange Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

________ servers are computers that enable users to buy goods and services over the web.

A

Commerce

27
Q

________ is the communications methodology where data are broken into smaller chunks to be sent over various routes at the same time.

A

Packet switching

28
Q

SMTP stands for ________.

A

Simple Mail Transfer Protocol

29
Q

________ is a method of communication in which a dedicated connection is formed between two points and the connection remains active during the transmission.

A

Circuit switching

30
Q

In the acronym HTTPS, the S stands for ________.

A

secure

31
Q

The ________ IP addressing scheme uses 128-bit addressing.

A

IPv6

32
Q

197.169.73.63 is an example of a(n) ________.

A

IP address

33
Q

.com and .edu are examples of a(n) ________.

A

top-level domain

34
Q

When using ________ addressing, a computer is assigned a temporary address from available IP addresses.

A

dynamic

35
Q

The IPv4 protocol is beginning to be replaced by the ________ protocol.

A

IPv6

36
Q

A(n) ________ links a URL to an IP address when a web page is requested.

A

DNS server

37
Q

When a(n) ________ address is assigned to a computer, its IP address will not change.

A

static

38
Q

In http://example.gov, what is the second-level domain?

A

example

39
Q

Transport Layer Security (TLS) and ________ are two protocols that provide data integrity and security for Internet transmission.

A

SSL - Secure Sockets Layer

40
Q

CGI scripts are known as ________ programs because these programs run on a web server.

A

server-side

41
Q

________ is a commonly used scripting language for creating DHTML effects.

A

JavaScript

42
Q

DHTML stands for ________.

A

Dynamic HyperText Markup Language

43
Q

<i> is an example of an HTML ________.</i>

A

tag

44
Q

________ combines HTML, cascading style sheets, and JavaScript.

A

DHTML

45
Q

A(n) ________ program is a computer program that runs on the client computer and requires no interaction with a web server.

A

client-side

46
Q

A(n) ________ is a small program that resides on a server, is downloaded to the client, and runs when needed without additional data transfers between the client and server.

A

applet

47
Q

MIME stands for ________.

A

Multipurpose Internet Mail Extensions

48
Q

________ is the process of encoding e-mail so that only the person with a corresponding key can decode and read the message.

A

encryption

49
Q

When using ________-key encryption, only the message sender and recipient have the code.

A

private

50
Q

In ________- key encryption, two keys, known as a key pair, are created, where one key is used for coding and the other key for decoding.

A

public

51
Q

FTP enables files to be downloaded or uploaded between computers.

A

TRUE

52
Q

When using packet switching, packets are always sent over the same route.

A

FALSE

53
Q

IPv6 uses six groups of 16-bit numbers.

A

FALSE

54
Q

Dynamic IP addressing is accomplished using a DHCP server.

A

TRUE

55
Q

Client-side programs run on a web server rather than on your computer.

A

FALSE

56
Q

JavaScript commands are executed on a server computer.

A

FALSE

57
Q

XML technologies allow web pages to change after they have been loaded.

A

FALSE

58
Q

Java and JavaScript refer to the same language.

A

FALSE

59
Q

Most instant messaging services provide a high level of encryption for their messages.

A

FALSE

60
Q
Match each of the following TCP/IP suite protocols to its definition:
I.	SMTP
II.	DHCP
III.	HTTP
IV.	TCP
V.	IP

A. transfers data from servers to browsers
B. prepares data for transmission providing for error checking and resending lost data
C. used for transmission of e-mail messages across the Internet
D. sends data between computers on the Internet
E. protocol that assigns dynamic IP addresses

A

C, E, A, B, D

61
Q
Match each of the following terms to its definition:
I.	circuit switching
II.	PGP
III.	handshaking
IV.	packet switching
V.	ICANN

A. breaks information down into pieces that can take different paths
B. a dedicated connection is formed between two communicating parties
C. allocates IP addresses
D. exchange of control packets between computers
E. public-key package

A

B, E, D, A, C

62
Q
Match each of the following terms to its definition:
I.	IP address
II.	key pair
III.	computer protocol
IV.	static addressing
V.	dynamic addressing

A. a set of rules for exchanging electronic information
B. used in a common encryption technique
C. temporary IP address for a computer that is assigned from a pool of available IP addresses
D. IP address for a computer does not change
E. a unique identification number that defines each computer, service, or other device that connects to the Internet

A

E, B, A, D, C

63
Q
Match each of the following terms to its definition:
I.	second-level domain
II.	cascading style sheet
III.	instant messaging
IV.	Internet cache
V.	private-key

A. section of a hard drive that stores web page information
B. used to decode an encrypted message
C. list of rules that define how to display HTML elements
D. communication between two or more people over the Internet in real time
E. unique domain within another domain

A

E, C, D, A, B

64
Q
Match each of the following servers to its definition:
I.	DNS
II.	DHCP
III.	commerce
IV.	web 
V.	e-mail

A. assigns users IP addresses for the duration of a session
B. specifically deals with the SMTP communication method
C. delivers HTML documents on request
D. translates a domain name into an IP address
E. enables users to purchase items over the Internet

A

D, A, E, C, B