Deck 6: The Internet

Full screen (f)
exit full mode
Question
A news article states that hackers tried to redirect unsuspecting users to infected sites using a technique called
A news article states that hackers tried to redirect unsuspecting users to infected sites using a technique called   cache poisoning. (Hint: Use the acronym.)<div style=padding-top: 35px> cache poisoning. (Hint: Use the acronym.)
Use Space or
up arrow
down arrow
to flip the card.
Question
Your friend is setting up a cable Internet connection. You recommend that she connect a router between her computer and the cable modem, and explain that network
Your friend is setting up a cable Internet connection. You recommend that she connect a router between her computer and the cable modem, and explain that network   translation can help to secure her computer against intrusions.<div style=padding-top: 35px> translation can help to secure her computer against intrusions.
Question
  , which adheres to IEEE 802.16 standards, is one of the most promising fixed wireless Internet technologies.<div style=padding-top: 35px> , which adheres to IEEE 802.16 standards, is one of the most promising fixed wireless Internet technologies.
Question
Make a timeline of events associated with the evolution of the Internet.
Question
Give examples of synchronous and asynchronous communications offered on the Internet.
Question
  Internet access can be defined as the ability to use the Internet while walking or traveling in a moving vehicle.<div style=padding-top: 35px> Internet access can be defined as the ability to use the Internet while walking or traveling in a moving vehicle.
Question
You're installing a high-speed Internet connection. The modem has a cable like the one shown at right. This modem is designed to connect to a computer's
You're installing a high-speed Internet connection. The modem has a cable like the one shown at right. This modem is designed to connect to a computer's   port.<div style=padding-top: 35px> port.
Question
Explain how Voice over IP works, and compare it to cell phone and land line services.
Question
A Wi-Fi
A Wi-Fi   is an area in which the public can access a Wi-Fi network that offers Internet service.<div style=padding-top: 35px> is an area in which the public can access a Wi-Fi network that offers Internet service.
Question
Draw a conceptual diagram illustrating the Internet backbone, NAPs, NSPs, routers, and ISPs. Extend the diagram to show how computers on a LAN access the Internet through a single DSL modem.
Question
List two examples of distributed grid computing and two examples of cloud computing.
Question
  G technologies include EV-DO, HSUPA, and EDGE.<div style=padding-top: 35px> G technologies include EV-DO, HSUPA, and EDGE.
Question
Your Internet access seems very slow one day. You might be able to use a networking utility called
Your Internet access seems very slow one day. You might be able to use a networking utility called   to discover the source of the slowdown.<div style=padding-top: 35px> to discover the source of the slowdown.
Question
Draw diagrams to illustrate how FTP, the original Napster, and Bit Torrent work.
Question
WAP devices have been replaced by devices that use mobile
WAP devices have been replaced by devices that use mobile   technologies offering the full Internet experience.<div style=padding-top: 35px> technologies offering the full Internet experience.
Question
List at least five protocols used on the Internet and describe what they are used for.
Question
Make a list of security concerns that are related to Internet access.
Question
Portable
Portable   technology can be used to access the Internet from remote locations where there are no cable, WiMAX, or cellular networks.<div style=padding-top: 35px> technology can be used to access the Internet from remote locations where there are no cable, WiMAX, or cellular networks.
Question
Suppose that you decide to open a little Web store to sell handcrafted pottery. Your Web site will need a(n)
Suppose that you decide to open a little Web store to sell handcrafted pottery. Your Web site will need a(n)   name.<div style=padding-top: 35px> name.
Question
Make a checklist of steps you can take to secure your computer from Internet-based intrusions.
Question
  computing offers Internet-based computer resources on demand so that individuals and businesses can contract for access as these resources are needed.<div style=padding-top: 35px> computing offers Internet-based computer resources on demand so that individuals and businesses can contract for access as these resources are needed.
Question
Explain the differences between static IP addresses, dynamic IP addresses, private IP addresses, and domain names.
Question
TCP\
TCP\   is the primary protocol suite used on the Internet.<div style=padding-top: 35px> is the primary protocol suite used on the Internet.
Question
Instant messaging, chat, and VoIP are classified as
Instant messaging, chat, and VoIP are classified as   communications because both parties have to be online.<div style=padding-top: 35px> communications because both parties have to be online.
Question
You frequently use public Wi-Fi hotspots in cafes and other locations. To keep your passwords and other confidential data safe, you work with your employer to install a(n)
You frequently use public Wi-Fi hotspots in cafes and other locations. To keep your passwords and other confidential data safe, you work with your employer to install a(n)   that encrypts the data you transmit over the Internet. (Hint: Use the acronym.)<div style=padding-top: 35px> that encrypts the data you transmit over the Internet. (Hint: Use the acronym.)
Question
204.127.129.1 is an example of an IPv4 address. True or false
204.127.129.1 is an example of an IPv4 address. True or false  <div style=padding-top: 35px>
Question
VoIP quality can be affected by
VoIP quality can be affected by   that results from too much packet latency.<div style=padding-top: 35px> that results from too much packet latency.
Question
Describe the difference between Ping and Traceroute by giving an example of when each would be used.
Question
A(n)
A(n)   name server maintains a database of IP addresses that correspond to addresses such as www.nike.com.<div style=padding-top: 35px> name server maintains a database of IP addresses that correspond to addresses such as www.nike.com.
Question
On some sites,
On some sites,   FTP can be used to upload and download files even if you don't have an account on the FTP server.<div style=padding-top: 35px> FTP can be used to upload and download files even if you don't have an account on the FTP server.
Question
Suppose you have installed a cable modem on a standalone PC. To secure your computer, you should activate
Suppose you have installed a cable modem on a standalone PC. To secure your computer, you should activate   software to filter packets entering and leaving your computer.<div style=padding-top: 35px> software to filter packets entering and leaving your computer.
Question
If you ping Google from your computer and get a result of 46 ms, you have a relatively slow Internet connection. True or false
If you ping Google from your computer and get a result of 46 ms, you have a relatively slow Internet connection. True or false  <div style=padding-top: 35px>
Question
  is a peer-to-peer file sharing protocol that uses a swarm of computers to exchange chunks of data that can eventually be assembled into complete files.<div style=padding-top: 35px> is a peer-to-peer file sharing protocol that uses a "swarm" of computers to exchange chunks of data that can eventually be assembled into complete files.
Question
List the advantages and disadvantages of dial-up, cable, DSL, satellite, and fixed wireless Internet services. List the Internet access methods in which upstream transmission rates differ from downstream rates.
Question
Most ISPs offer
Most ISPs offer   Internet connections, meaning the downstream speed is faster than the upstream speed.<div style=padding-top: 35px> Internet connections, meaning the downstream speed is faster than the upstream speed.
Question
Hackers use
Hackers use   scanning software to look for computers connected to the Internet that are vulnerable to intrusions.<div style=padding-top: 35px> scanning software to look for computers connected to the Internet that are vulnerable to intrusions.
Question
Your friend, a film student, has created a 20-minute short film that she wants to distribute to friends. The file is much too large to be an e-mail attachment and she doesn't have access to a(n)
Your friend, a film student, has created a 20-minute short film that she wants to distribute to friends. The file is much too large to be an e-mail attachment and she doesn't have access to a(n)   server. You suggest that she try posting it at a(n)   P2P file sharing site where a swarm of computers can assist with the downloads.<div style=padding-top: 35px> server. You suggest that she try posting it at a(n)
Your friend, a film student, has created a 20-minute short film that she wants to distribute to friends. The file is much too large to be an e-mail attachment and she doesn't have access to a(n)   server. You suggest that she try posting it at a(n)   P2P file sharing site where a swarm of computers can assist with the downloads.<div style=padding-top: 35px> P2P file sharing site where a swarm of computers can assist with the downloads.
Question
Dial-up and DSL Internet access use the telephone cables already installed in a home or business. True or false
Dial-up and DSL Internet access use the telephone cables already installed in a home or business. True or false  <div style=padding-top: 35px>
Question
  software monitors network activity, blocks packets from suspicious IP addresses, and reports intrusion attempts.<div style=padding-top: 35px> software monitors network activity, blocks packets from suspicious IP addresses, and reports intrusion attempts.
Question
List the options for mobile and portable Internet access, and explain their strengths and weaknesses.
Question
Always-on connections are not a security risk because they use DOCSIS. True or false
Always-on connections are not a security risk because they use DOCSIS. True or false  <div style=padding-top: 35px>
Question
One of the best defenses against intrusions is to install a(n)
One of the best defenses against intrusions is to install a(n)   between your standalone computer or LAN and your Internet connection device.<div style=padding-top: 35px> between your standalone computer or LAN and your Internet connection device.
Question
Your friend wants you to follow her tweets and asks if you have a(n)
Your friend wants you to follow her tweets and asks if you have a(n)   account.<div style=padding-top: 35px> account.
Question
The two requirements for cable Internet service are circuitry to handle
The two requirements for cable Internet service are circuitry to handle   protocols and a cable modem.<div style=padding-top: 35px> protocols and a cable modem.
Question
A(n)
A(n)   IP address is a non-routable IP address that can be used within a LAN, but not for Internet data transport.<div style=padding-top: 35px> IP address is a non-routable IP address that can be used within a LAN, but not for Internet data transport.
Question
Explain the advantages of mobile broadband services compared to WAP service.
Question
Satellite Internet service typically has a high
Satellite Internet service typically has a high   rate, which is unsuitable for some online gaming and Voice over IP.<div style=padding-top: 35px> rate, which is unsuitable for some online gaming and Voice over IP.
Question
When using a public Wi-Fi hotspot, you can use a personal
When using a public Wi-Fi hotspot, you can use a personal   to encrypt data that travels from your computer. (Hint: Use the acronym.)<div style=padding-top: 35px> to encrypt data that travels from your computer. (Hint: Use the acronym.)
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/48
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: The Internet
1
A news article states that hackers tried to redirect unsuspecting users to infected sites using a technique called
A news article states that hackers tried to redirect unsuspecting users to infected sites using a technique called   cache poisoning. (Hint: Use the acronym.) cache poisoning. (Hint: Use the acronym.)
Domain Name Sever
• The technique used to redirect web site from one to another when DNS is malfunctioned is called DNS Cache Poisoning.
• Therefore, the hacker used this DNS Cache Poisoning technique to divert the website.
Therefore, the appropriate word to fill in the blank is DNS.
2
Your friend is setting up a cable Internet connection. You recommend that she connect a router between her computer and the cable modem, and explain that network
Your friend is setting up a cable Internet connection. You recommend that she connect a router between her computer and the cable modem, and explain that network   translation can help to secure her computer against intrusions. translation can help to secure her computer against intrusions.
Address
• Network Address Translation (NAT) is used to keep track of the packets with respect to their IP address.
• Since, it is used as a security technique, I request my friend to use NAT between the router and system or computer to set a cable internet connection.
Therefore, the appropriate word to fill in the blank is Address.
3
  , which adheres to IEEE 802.16 standards, is one of the most promising fixed wireless Internet technologies. , which adheres to IEEE 802.16 standards, is one of the most promising fixed wireless Internet technologies.
WIMAX
WIMAX stands for worldwide interoperability for microwave access. It is also designated as IEEE 802.16 by Ethernet compatibility network.
It acts as an alternative to DSL where cable service or telephone lines are not available such as in rural area.
A WIMAX sends and receive data with the help of WIMAX antennas. A WIMAX is capable of covering approximate 8 KM area. It can transmit data at 70Mbps rate.
Therefore, the appropriate word to fill in the blank is WIMAX.
4
Make a timeline of events associated with the evolution of the Internet.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
5
Give examples of synchronous and asynchronous communications offered on the Internet.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
6
  Internet access can be defined as the ability to use the Internet while walking or traveling in a moving vehicle. Internet access can be defined as the ability to use the Internet while walking or traveling in a moving vehicle.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
7
You're installing a high-speed Internet connection. The modem has a cable like the one shown at right. This modem is designed to connect to a computer's
You're installing a high-speed Internet connection. The modem has a cable like the one shown at right. This modem is designed to connect to a computer's   port. port.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
8
Explain how Voice over IP works, and compare it to cell phone and land line services.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
9
A Wi-Fi
A Wi-Fi   is an area in which the public can access a Wi-Fi network that offers Internet service. is an area in which the public can access a Wi-Fi network that offers Internet service.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
10
Draw a conceptual diagram illustrating the Internet backbone, NAPs, NSPs, routers, and ISPs. Extend the diagram to show how computers on a LAN access the Internet through a single DSL modem.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
11
List two examples of distributed grid computing and two examples of cloud computing.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
12
  G technologies include EV-DO, HSUPA, and EDGE. G technologies include EV-DO, HSUPA, and EDGE.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
13
Your Internet access seems very slow one day. You might be able to use a networking utility called
Your Internet access seems very slow one day. You might be able to use a networking utility called   to discover the source of the slowdown. to discover the source of the slowdown.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
14
Draw diagrams to illustrate how FTP, the original Napster, and Bit Torrent work.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
15
WAP devices have been replaced by devices that use mobile
WAP devices have been replaced by devices that use mobile   technologies offering the full Internet experience. technologies offering the full Internet experience.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
16
List at least five protocols used on the Internet and describe what they are used for.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
17
Make a list of security concerns that are related to Internet access.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
18
Portable
Portable   technology can be used to access the Internet from remote locations where there are no cable, WiMAX, or cellular networks. technology can be used to access the Internet from remote locations where there are no cable, WiMAX, or cellular networks.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
19
Suppose that you decide to open a little Web store to sell handcrafted pottery. Your Web site will need a(n)
Suppose that you decide to open a little Web store to sell handcrafted pottery. Your Web site will need a(n)   name. name.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
20
Make a checklist of steps you can take to secure your computer from Internet-based intrusions.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
21
  computing offers Internet-based computer resources on demand so that individuals and businesses can contract for access as these resources are needed. computing offers Internet-based computer resources on demand so that individuals and businesses can contract for access as these resources are needed.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
22
Explain the differences between static IP addresses, dynamic IP addresses, private IP addresses, and domain names.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
23
TCP\
TCP\   is the primary protocol suite used on the Internet. is the primary protocol suite used on the Internet.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
24
Instant messaging, chat, and VoIP are classified as
Instant messaging, chat, and VoIP are classified as   communications because both parties have to be online. communications because both parties have to be online.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
25
You frequently use public Wi-Fi hotspots in cafes and other locations. To keep your passwords and other confidential data safe, you work with your employer to install a(n)
You frequently use public Wi-Fi hotspots in cafes and other locations. To keep your passwords and other confidential data safe, you work with your employer to install a(n)   that encrypts the data you transmit over the Internet. (Hint: Use the acronym.) that encrypts the data you transmit over the Internet. (Hint: Use the acronym.)
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
26
204.127.129.1 is an example of an IPv4 address. True or false
204.127.129.1 is an example of an IPv4 address. True or false
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
27
VoIP quality can be affected by
VoIP quality can be affected by   that results from too much packet latency. that results from too much packet latency.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
28
Describe the difference between Ping and Traceroute by giving an example of when each would be used.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
29
A(n)
A(n)   name server maintains a database of IP addresses that correspond to addresses such as www.nike.com. name server maintains a database of IP addresses that correspond to addresses such as www.nike.com.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
30
On some sites,
On some sites,   FTP can be used to upload and download files even if you don't have an account on the FTP server. FTP can be used to upload and download files even if you don't have an account on the FTP server.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
31
Suppose you have installed a cable modem on a standalone PC. To secure your computer, you should activate
Suppose you have installed a cable modem on a standalone PC. To secure your computer, you should activate   software to filter packets entering and leaving your computer. software to filter packets entering and leaving your computer.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
32
If you ping Google from your computer and get a result of 46 ms, you have a relatively slow Internet connection. True or false
If you ping Google from your computer and get a result of 46 ms, you have a relatively slow Internet connection. True or false
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
33
  is a peer-to-peer file sharing protocol that uses a swarm of computers to exchange chunks of data that can eventually be assembled into complete files. is a peer-to-peer file sharing protocol that uses a "swarm" of computers to exchange chunks of data that can eventually be assembled into complete files.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
34
List the advantages and disadvantages of dial-up, cable, DSL, satellite, and fixed wireless Internet services. List the Internet access methods in which upstream transmission rates differ from downstream rates.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
35
Most ISPs offer
Most ISPs offer   Internet connections, meaning the downstream speed is faster than the upstream speed. Internet connections, meaning the downstream speed is faster than the upstream speed.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
36
Hackers use
Hackers use   scanning software to look for computers connected to the Internet that are vulnerable to intrusions. scanning software to look for computers connected to the Internet that are vulnerable to intrusions.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
37
Your friend, a film student, has created a 20-minute short film that she wants to distribute to friends. The file is much too large to be an e-mail attachment and she doesn't have access to a(n)
Your friend, a film student, has created a 20-minute short film that she wants to distribute to friends. The file is much too large to be an e-mail attachment and she doesn't have access to a(n)   server. You suggest that she try posting it at a(n)   P2P file sharing site where a swarm of computers can assist with the downloads. server. You suggest that she try posting it at a(n)
Your friend, a film student, has created a 20-minute short film that she wants to distribute to friends. The file is much too large to be an e-mail attachment and she doesn't have access to a(n)   server. You suggest that she try posting it at a(n)   P2P file sharing site where a swarm of computers can assist with the downloads. P2P file sharing site where a swarm of computers can assist with the downloads.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
38
Dial-up and DSL Internet access use the telephone cables already installed in a home or business. True or false
Dial-up and DSL Internet access use the telephone cables already installed in a home or business. True or false
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
39
  software monitors network activity, blocks packets from suspicious IP addresses, and reports intrusion attempts. software monitors network activity, blocks packets from suspicious IP addresses, and reports intrusion attempts.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
40
List the options for mobile and portable Internet access, and explain their strengths and weaknesses.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
41
Always-on connections are not a security risk because they use DOCSIS. True or false
Always-on connections are not a security risk because they use DOCSIS. True or false
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
42
One of the best defenses against intrusions is to install a(n)
One of the best defenses against intrusions is to install a(n)   between your standalone computer or LAN and your Internet connection device. between your standalone computer or LAN and your Internet connection device.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
43
Your friend wants you to follow her tweets and asks if you have a(n)
Your friend wants you to follow her tweets and asks if you have a(n)   account. account.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
44
The two requirements for cable Internet service are circuitry to handle
The two requirements for cable Internet service are circuitry to handle   protocols and a cable modem. protocols and a cable modem.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
45
A(n)
A(n)   IP address is a non-routable IP address that can be used within a LAN, but not for Internet data transport. IP address is a non-routable IP address that can be used within a LAN, but not for Internet data transport.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
46
Explain the advantages of mobile broadband services compared to WAP service.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
47
Satellite Internet service typically has a high
Satellite Internet service typically has a high   rate, which is unsuitable for some online gaming and Voice over IP. rate, which is unsuitable for some online gaming and Voice over IP.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
48
When using a public Wi-Fi hotspot, you can use a personal
When using a public Wi-Fi hotspot, you can use a personal   to encrypt data that travels from your computer. (Hint: Use the acronym.) to encrypt data that travels from your computer. (Hint: Use the acronym.)
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 48 flashcards in this deck.