Deck 13: Behind the Scenes: How the Internet Works
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/124
Play
Full screen (f)
Deck 13: Behind the Scenes: How the Internet Works
1
To boldface text in HTML, you would enclose your text in ________.
A) and
B) /b and b
C) *b* and */b*
D) HTM.bold.on and HTM.bold.off
A) and
B) /b and b
C) *b* and */b*
D) HTM.bold.on and HTM.bold.off
A
2
________ describes the website content in terms of the data that is being described rather than how it is to be displayed.
A) CGI
B) JavaScript
C) XML
D) HTML
A) CGI
B) JavaScript
C) XML
D) HTML
C
3
Which of the following organizations research new Internet technologies to improve its capabilities?
A) Internet Architecture Board
B) Internet Society
C) World Wide Web Consortium
D) Internet Engineering Task Force
A) Internet Architecture Board
B) Internet Society
C) World Wide Web Consortium
D) Internet Engineering Task Force
D
4
A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses.
A) dynamic
B) static
C) assigned
D) transition
A) dynamic
B) static
C) assigned
D) transition
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following was created for the transfer of hypertext documents across the Internet?
A) SSL
B) HTTP
C) FTP
D) AJAX
A) SSL
B) HTTP
C) FTP
D) AJAX
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
6
An IP address that does not change and is usually assigned manually by a network administrator or an ISP is called a ________ address.
A) dynamic
B) static
C) fixed
D) stationary
A) dynamic
B) static
C) fixed
D) stationary
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
7
A(n) ________ address is a unique number that identifies a computer, server, or device connected to the Internet.
A) TCP
B) IP
C) SMTP
D) NetBIOS
A) TCP
B) IP
C) SMTP
D) NetBIOS
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
8
IPv6 was introduced when IPv4 ________.
A) became too old
B) was eliminated
C) no longer had enough unique addresses
D) was revoked
A) became too old
B) was eliminated
C) no longer had enough unique addresses
D) was revoked
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
9
The main suite of protocols used for transmitting data on the Internet is ________.
A) FTP
B) TCP/IP
C) SMTP
D) POP
A) FTP
B) TCP/IP
C) SMTP
D) POP
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
10
The main path of the Internet along which data travels the fastest is known as the Internet ________.
A) protocol
B) highway
C) backbone
D) cache
A) protocol
B) highway
C) backbone
D) cache
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
11
An IP address in the form 197.169.100.1 is called a(n) ________.
A) sequential access number
B) dotted quad
C) encryption key
D) random number
A) sequential access number
B) dotted quad
C) encryption key
D) random number
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
12
In the URL http://www.pearsonhighered.com, which of the following is the top-level domain?
A) http
B) www
C) pearsonhighered
D) )com
A) http
B) www
C) pearsonhighered
D) )com
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following information is not contained in a packet sent over the Internet?
A) The size (in bytes) of the packet
B) The address to which the packet is sent
C) The address from where the packet originates
D) The data that are transmitted
A) The size (in bytes) of the packet
B) The address to which the packet is sent
C) The address from where the packet originates
D) The data that are transmitted
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
14
________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.
A) Packet switching
B) An open circuit
C) Circuit switching
D) A closed circuit
A) Packet switching
B) An open circuit
C) Circuit switching
D) A closed circuit
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
15
The ________ is responsible for the Internet's domain name system and the allocation of IP addresses.
A) ISOC
B) ICANN
C) W3C
D) IAB
A) ISOC
B) ICANN
C) W3C
D) IAB
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
16
Individual Internet users connect to ISPs through a(n) ________.
A) User Datagram Protocol (UDP)
B) T line
C) optical carrier (OC) line
D) point of presence (POP)
A) User Datagram Protocol (UDP)
B) T line
C) optical carrier (OC) line
D) point of presence (POP)
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
17
When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n) ________ server.
A) DNS
B) URL
C) FTP
D) XML
A) DNS
B) URL
C) FTP
D) XML
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
18
High-speed ________ communication lines on the Internet backbone use fiber optics.
A) IP
B) OC
C) DSL
D) cable
A) IP
B) OC
C) DSL
D) cable
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
19
is an example of an HTML ________.
A) marker
B) tag
C) indicator
D) key
A) marker
B) tag
C) indicator
D) key
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is not used in developing websites?
A) XML
B) KML
C) DHTML
D) HTML
A) XML
B) KML
C) DHTML
D) HTML
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
21
In public-key encryption, the two keys, one for coding and one for decoding, are known as ________.
A) code keys
B) linked keys
C) key tags
D) a key pair
A) code keys
B) linked keys
C) key tags
D) a key pair
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
22
________ permits two or more people to communicate over the Internet in real time.
A) E-mail
B) Snapfish
C) Flickr
D) Instant messaging
A) E-mail
B) Snapfish
C) Flickr
D) Instant messaging
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
23
A(n) ________ is a small program that resides on a server and is designed to be downloaded and run on a client computer.
A) CGI script
B) SSL
C) applet
D) JavaScript
A) CGI script
B) SSL
C) applet
D) JavaScript
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
24
A typical IpV6 address has the following format: XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX. what does each X represent?
A) hexadecimal digit
B) binary digit
C) decimal digit
D) dotted quad
A) hexadecimal digit
B) binary digit
C) decimal digit
D) dotted quad
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
25
XML technologies allow web pages to change after they have been loaded.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
26
FTP enables files to be downloaded or uploaded between computers.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
27
IPv6 uses six groups of 16-bit numbers.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
28
Which protocol is used when sending files as attachments by e-mail?
A) Multipurpose Internet Mail Extensions (MIME)
B) Post Office Protocol (POP)
C) JavaScript Object Notation (JSON)
D) User Datagram Protocol (UDP)
A) Multipurpose Internet Mail Extensions (MIME)
B) Post Office Protocol (POP)
C) JavaScript Object Notation (JSON)
D) User Datagram Protocol (UDP)
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
29
When using packet switching, packets are always sent over the same route.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
30
Strong encryption now requires ________-bit keys.
A) 40
B) 128
C) 256
D) 512
A) 40
B) 128
C) 256
D) 512
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
31
Client-side programs run on a web server rather than on your computer.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following is an example of an instant messaging service?
A) LinkedIn
B) Monster
C) WhatsApp
D) Flickr
A) LinkedIn
B) Monster
C) WhatsApp
D) Flickr
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
33
Dynamic IP addressing is accomplished using a DHCP server.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
34
An applet is a small application that resides on a server but is downloaded to, and run on, the client computer.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
35
The JavaScript ________ defines items on a web page such as graphics, tables, and headers as objects.
A) SSL
B) MIME
C) JSON
D) DOM
A) SSL
B) MIME
C) JSON
D) DOM
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
36
The tag informs a browser that the text that follows the tag should be italicized.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
37
The United States government is the sole country in charge of the Internet.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
38
HTML is an acronym for Highly Textual Markup Language.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
39
Java and JavaScript refer to the same language.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
40
File Transfer Protocol (FTP) is used to transmit e-mail messages across the Internet.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
41
The majority of Internet communications follow the client/server model of network communications.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
42
TCP uses a three-way handshake to establish a connection.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
43
When connecting to the Internet, the acronym POP stands for Post Office Protocol.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
44
Facebook Connect is one of the most popular instant messaging services.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
45
The OpenPgP encryption protocol stands for Open Pretty Good Privacy.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
46
A typical ________ is made up of one or more network switches to which ISPs connect to each other.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
47
A communications server is a specialized computer whose sole function is to store, process, and send e-mail.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
48
________ is a method of communication in which a dedicated connection is formed between two points and the connection remains active during the transmission.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
49
JavaScript uses the Device Object Model to organize the objects and page elements.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
50
________ is the communications methodology where data are broken into smaller chunks to be sent over various routes at the same time.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
51
SMTP stands for ________.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
52
Most instant messaging services provide a high level of encryption for their messages.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
53
Each of the four numbers in a dotted decimal number is referred to as an octet.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
54
The ________ is a consortium of organizations that develops web protocols and sets standards.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
55
In the acronym HTTPS, the S stands for ________.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
56
The ________ IP addressing scheme uses 128-bit addressing.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
57
________ servers are computers that host software that enables users to buy goods and services over the web.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
58
197.169.73.63 is an example of a(n) ________.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
59
Each root DNS server knows the location of all the DNS servers that contain the master listings for an entire top-level domain.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
60
Cloud service providers often host file servers for customers.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
61
When using ________-key encryption, only the message sender and recipient have the code.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
62
PHP is a popular choice for coding ________ programs.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
63
An HTML ________ scripting language tucks programming code directly within the HTML of a web page.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
64
A(n) ________ is a small program that resides on a server, is downloaded to the client, and runs when needed without additional data transfers between the client and server.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
65
When using ________ addressing, a computer is assigned a temporary address from a pool of available IP addresses.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
66
DHTML stands for ________.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
67
A(n) ________-oriented protocol requires two computers to exchange control packets.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
68
________ is the process of encoding e-mail so that only the person with a corresponding key can decode and read the message.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
69
In the URL http://example.gov, what is the second-level domain?
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
70
A(n) ________ links a URL to an IP address when a web page is requested.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
71
is an example of an HTML ________.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
72
A(n) ________ program is a computer program that runs on the client computer and requires no interaction with a web server.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
73
Within a URL, .com and .edu are examples of a(n) ________.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
74
________ combines HTML, cascading style sheets, and JavaScript.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
75
Transport Layer Security (TLS) and ________ are two protocols that provide data integrity and security for Internet transmission.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
76
A(n) ________ protocol doesn't require any type of connection to be established or maintained between two computers.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
77
When a(n) ________ address is assigned to a computer, its IP address will NOT change.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
78
________ is a commonly used scripting language for creating DHTML effects.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
79
The IPv4 protocol is beginning to be replaced by the ________ protocol.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
80
The MIME specification stands for ________.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck