Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

1) During which period of time did the Institutionalization phase of Internet development take

place?
A) 1950-1960
B) 1961-1974
C) 1975-1995
D) 1995-through the present

2) Which of the following occurred during the Commercialization phase of Internet


development?
A) The fundamental building blocks of the Internet were realized in actual hardware and
software.
B) Personal computers were invented.
C) The Domain Name System was introduced.
D) NSF privatized the operation of the Internet's backbone.

3) During which phase of the development of the Internet was the Domain Name System (DNS)
introduced?
A) commercialization phase
B) institutional phase
C) innovation phase
D) consolidation phase

4) Which of the following is not one of the basic technological foundations of the Internet?
A) client/server computing
B) FTP
C) TCP/IP
D) packet switching

5) The process of slicing digital messages into parcels, sending them along different
communication paths as they become available, and reassembling them at the destination point is
called:
A) routing.
B) the Transmission Control Protocol.
C) packet switching.
D) the File Transfer Protocol.

6) Which of the following is the core communications protocol for the Internet?
A) Telnet
B) FTP
C) TCP/IP
D) TLS

7) The Transport Layer of TCP/IP is responsible for which of the following?


A) placing packets on and receiving them from the network medium
B) addressing, packaging, and routing messages
C) providing communication with the application by acknowledging and sequencing the packets
to and from the application
D) providing a variety of applications with the ability to access the services of the lower layers

1
TEST BANK- CHAPTER 02
8) The Internet Layer of TCP/IP is responsible for which of the following?
A) placing packets on and receiving them from the network medium
B) addressing, packaging, and routing messages
C) providing communication with the application by acknowledging and sequencing the packets
to and from the application
D) providing a variety of applications with the ability to access the services of the lower layers

9) An IPv4 address is expressed as a:


A) 32-bit number that appears as a series of four separate numbers separated by semicolons.
B) 64-bit number that appears as a series of four separate numbers separated by semicolons.
C) 64-bit number that appears as a series of four separate numbers separated by periods.
D) 32-bit number that appears as a series of four separate numbers separated by periods.

10) The ________ allows a natural language expression, such as Google.com to represent a
numeric IP address.
A) uniform resource locator system
B) Internet protocol addressing schema
C) domain name system
D) assigned numbers and names (ANN) system

11) The address used by a browser to identify the location of content on the Web is called:
A) a domain name.
B) a uniform resource locator.
C) an IP address.
D) a file path.

12) Which of the following is not an advantage of client/server computing over centralized
mainframe computing?
A) It is easy to expand capacity by adding servers and clients.
B) Each client added to the network increases the network's overall capacity and transmission
speeds.
C) Client/server networks are less vulnerable, in part because the processing load is balanced
over many powerful smaller computers rather than concentrated in a single huge computer.
D) There is less risk that a system will completely malfunction because backup or mirror servers
can pick up the slack if one server goes down.

13) ________ is a model of computing in computer processing, storage, software, and other
services which are provided as a shared pool of virtualized resources over the Internet.
A) Client/server computing
B) P2P computing
C) Mobile computing
D) Cloud computing

14) Which of the following protocols is used to send mail to a server?


A) SMTP
B) FTP
C) HTTP
D) SSL

2
TEST BANK- CHAPTER 02
15) Where does TLS operate within TCP/IP?
A) between the Internet Layer and the Transport Layer
B) between the Transport Layer and the Application Layer
C) between the Network Interface Layer and the Transport Layer
D) between the Internet Layer and the Application Layer

16) Which of the following statements about cloud computing is not true?
A) A public cloud is typically used by companies with stringent privacy and security
requirements.
B) Dropbox is an example of a public cloud.
C) Hybrid clouds offer both public and private cloud options.
D) A private cloud may be hosted internally or externally.

17) ________ is used to allow remote login on another computer.


A) Telnet
B) FTP
C) HTTP
D) SSL

18) ________ is a utility program that allows you to check the connection between your client
and a TCP/IP network.
A) Ping
B) Telnet
C) Tracert
D) Finger

19) Which of the following technologies has enabled the Internet to grow exponentially to
support millions of users, without overloading the network architecture?
A) fiber optics
B) Wi-Fi
C) IPv6
D) client/server computing

20) Which of the following are specialized computers that transmit message parcels along
available Internet communication paths and on to their destinations?
A) routers
B) Web servers
C) IP servers
D) packet servers

21) Which of the following is a set of rules for transferring data?


A) protocol
B) packet
C) router
D) IP address

3
TEST BANK- CHAPTER 02
22) Which of the following is not a basic type of cloud computing service?
A) IaaS
B) PaaS
C) SaaS
D) FiOS

23) Which of the following are central directories that list all domain names currently in use for
specific domains?
A) Web servers
B) root servers
C) client servers
D) DNS servers

24) Which of the following was the original purpose of the Internet?
A) to provide a network that would allow businesses to connect with consumers
B) to link large mainframe computers on different college campuses
C) to develop a military communications system that could withstand nuclear war
D) to enable government agencies to track civilian communications

25) Which of the following is a utility program that allows you to track the path of a message
sent from a client computer to a remote computer on the Internet?
A) Telnet
B) Ping
C) IMAP
D) Tracert

26) Which of the following protocols enables the exchange of routing information among
different autonomous systems on the Internet?
A) HTTP
B) BGP
C) FTP
D) SMTP

27) The term latency refers to a delay that can be experienced in packet-switched networks.

28) FTP is the protocol that permits users to transfer files from a server to their client computer,
and vice versa.

29) IMAP is the Internet protocol used by a browser to transfer web pages.

30) A private cloud is operated for the benefit of multiple firms.

31) Amazon Web Services is an example of a private cloud.

32) HTTP/2 is supported by almost all the leading web browsers.

33) In a hybrid cloud computing model, firms use their own infrastructure for their most essential
core activities.

4
TEST BANK- CHAPTER 02
34) What are the essential characteristics of cloud computing?

35) What are the implications of cloud computing for e-commerce?

36) Explain each of the three important concepts behind the Federal Networking Council's
definition of the term Internet. Explain how each technology contributes to the functioning of the
Internet today.

37) Which of the following organizations monitor Internet policies and practices?
A) IETF
B) ISOC
C) W3C
D) ICANN

38) TCP/IP operates in which layer of Internet architecture?


A) Network Technology Substrate layer
B) Middleware Services layer
C) Transport Services and Representation Standards layer
D) Applications layer

39) The Web runs in which layer of Internet architecture?


A) Network Technology Substrate layer
B) Middleware Services layer
C) Transport Services and Representation Standards layer
D) Applications layer

40) The layer of Internet architecture that ties the applications to the communications network
and includes security and authentication services is called the:
A) Network Technology Substrate layer.
B) Middleware Services layer.
C) Transport Services and Representation Standards layer.
D) Applications layer.

41) The backbone of the Internet is formed by:


A) Internet Exchange Points (IXPs).
B) Tier 1 ISPs.
C) Network Access Points (NAPs).
D) Metropolitan Area Exchanges (MAEs).

42) When talking about the physical elements of the Internet, the term redundancy refers to:
A) transmitting multiple copies of a single packet to safeguard against data loss.
B) the use of tiered high-speed switching computers to connect the backbone to regional and
local networks.
C) delays in messages caused by the uneven flow of information through the network.
D) multiple duplicate devices and paths in a network built so that data can be rerouted if a
breakdown occurs.

5
TEST BANK- CHAPTER 02
43) The ________ is a consortium of corporations, government agencies, and nonprofit
organizations that monitors Internet policies and practices.
A) Internet Engineering Steering Group (IESG)
B) World Wide Web Consortium (W3C)
C) Internet Engineering Task Force (IETF)
D) Internet Society (ISOC)

44) The ________ helps define the overall structure of the Internet.
A) IAB
B) IESG
C) W3C
D) ITU

45) Which of the following is not true about the mobile platform?
A) Most smartphones use Intel chips.
B) Smartphones and tablet computers are the primary means to access the Internet, both in the
United States and worldwide.
C) Most smartphones use either Google's Android or Apple's iOS operating systems.
D) Smartphones use flash memory chips.

46) Which of the following organizations involved with Internet governance has the United
States recently given up control over?
A) ICANN
B) IGF
C) NTIA
D) IANA

47) In the United States, about ________ of Internet traffic now occurs over Internet Protocol
version 6 (IPv6).
A) 10%
B) 15%
C) 25%
D) 50%

48) The major hubs in the United States where the Internet backbone intersects with regional and
local networks are now commonly referred to as Internet Exchange Points (IXPs).

49) T1 and T3 refer to international telephone standards for digital communication.

50) Bluetooth is a high-speed, fixed broadband wireless local area network for commercial and
residential use.

51) Tier 1 ISPs provide Internet access to consumers and businesses.

52) Identify and describe the two types of ISP service, along with the Internet connection
methods, in use today.

6
TEST BANK- CHAPTER 02
53) You are browsing the Web on your tablet computer. Describe the web page data path from
its origination point on a distant computer to your tablet.

54) Which of the following is not a concern about IoT?


A) the falling cost of sensors
B) interoperability
C) security
D) privacy

55) Which of the following statements about fiber-optic cable is not true?
A) It transmits more data at faster speeds than coaxial or twisted pair cable.
B) It is thinner and lighter than coaxial or twisted pair cable.
C) Most U.S. homes have fiber connections.
D) Long-haul fiber optic networks are typically owned by firms referred to as Tier I ISPs.

56) The major technologies used with wireless local area networks are:
A) Wi-Fi and Bluetooth.
B) Wi-Fi and WiMax.
C) Bluetooth and 3G.
D) WiMax and 3G.

57) Which of the following IEEE standards provide for high-speed short-range Wi-Fi?
A) 802.11ad
B) 802.11ay
C) 802.11ah
D) 802.11af

58) The Internet of Things (IoT) is based on sensors that can collect data and connect to the
Internet.

59) You could expect to find all of the following services in a web server software package
except:
A) security services.
B) FTP.
C) search engine.
D) an RSS aggregator.

60) Which of the following enables Internet users to communicate with each other, although not
in real time?
A) mobile messaging
B) online forum
C) SMS messaging
D) VoIP

7
TEST BANK- CHAPTER 02

You might also like