Deck 13: How the Internet Works

Full screen (f)
exit full mode
Question
Public IP addresses are valid within:

A) a LAN.
B) a root server.
C) the Internet.
D) a WAN.
E) a system.
Use Space or
up arrow
down arrow
to flip the card.
Question
A service that provides temporary private IP addresses to computer users is called:

A) LAN IP.
B) DNS.
C) DHCP.
D) TCP/IP.
Question
The is the process of changing public IP addresses into private IP addresses.

A) conversion
B) IEEE
C) NAT
D) OSI
E) MAC addresses
Question
Routers and other devices provide the service of:

A) URL registration.
B) traffic maintenance.
C) NAT.
D) programming support.
E) query support.
Question
Switches work with at Layer 2.

A) NAT
B) MAC addresses
C) ISPs
D) frames
E) packets
Question
The Internet is based on a packet- switching protocol called:

A) NAT.
B) SOHO.
C) SMTP.
D) ftp.
E) TCP/IP.
Question
208.77.188.103 is an example of a(n) .

A) Domain registration
B) DNS
C) IP address
D) Domain name
Question
Routers work with at Layer 3.

A) frames
B) MAC addresses
C) packets
D) NAT
E) ISPs
Question
licenses other agencies to register unique domain names and their associated IP addresses.

A) SOHO
B) DNS
C) ICANN
D) IETF
E) DSL
Question
A document's address on the web is its .

A) DNR
B) ICAAN
C) TLD
D) DNS
E) URL
Question
is a standard email protocol.

A) FTP
B) HTTP
C) TCP/IP
D) OSI
E) SMTP
Question
A resolves domain names into IP addresses.

A) DHCP
B) DNS
C) LAN IP
D) TCP/IP
Question
A(n) program examines your email and attachments and breaks a lengthy message into pieces called segments.

A) SMTP
B) ftp
C) http
D) OSI
E) TCP
Question
Every domain name in the world is .

A) resolved
B) unique
C) saved on every computer
D) available
Question
ICANN manages thirteen _ that maintain a list of IP addresses of servers that resolve each type of TLD.

A) TLD servers
B) DNS servers
C) URL servers
D) root servers
E) cache servers
Question
Public IP addresses are converted to private ones and vice versa using:

A) ATM.
B) NAT.
C) )NET.
D) MAC.
E) PSDN.
Question
Private IP addresses are valid within:

A) the Internet.
B) a system.
C) a LAN.
D) a WAN.
E) a root server.
Question
The protocol is used for the processing of Web pages.

A) social
B) TCP/IP
C) ftp
D) http
E) OSI
Question
administers domain name registration.

A) ICAAN
B) URL
C) TLD
D) ICANN
E) DNR
Question
In the various layers of a network architecture, a is a set of rules that accomplish the tasks assigned to that layer.

A) protocol
B) frame
C) models
D) logic
E) segment
Question
IP addresses are also called _.
Question
The network architecture is divided into five layers.
Question
The process of changing a name into its IP address is called the domain name.
Question
TCP is a communications protocol that helps break messages and files into .
Question
A picture file attached to an email message will probably be broken into chunks or
of data when transmitted over a variety of networks to its eventual destination.
Question
Domain names are resolved into IP addresses by the _ _.
Question
is a protocol used to copy files from one computer to another.
Question
The last letters in any domain name are referred to as the _ .
Question
maintain lists of IP addresses that resolve each type of top- level domain.
Question
URL stands for .
Question
A network
Question
The converts user- friendly names into their IP addresses.
Question
provides temporary private IP addresses to computer users.
Question
A network is a set of rules for accomplishing the functions of a particular layer.
Question
SMTP is an example of a network .
Question
Network devices have two addresses; a physical MAC address and a logical .
Question
is an unrestricted top- level domain that was intended for network providers.
Question
The letters in a domain name are known as the top- level domain name.
Question
A network has a table of data to help route traffic to the right destination.
Question
is a nonprofit organization that is responsible for administering the registration of domain names.
Question
Email programs operate primarily at the transport layer.
Question
File Transfer Protocol is an application- layer protocol.
Question
The Internet has adopted the TCP/IP- OSI architecture.
Question
Every NIC is given a MAC address at the factory.
Question
Switches employ a table to tell it where to direct traffic.
Question
The Internet Engineering Task Force developed a five layer protocol architecture known as TCP/IP- OSI.
Question
The ISO developed TCP/IP layered protocol.
Question
In most cases, when you plug your computer into a network, a program in Windows or other operating system will search that network for a DHCP server.
Question
Not every layer has a protocol associated with it.
Question
The DNS converts IP addresses into user- friendly domain names.
Question
IP addresses are not permanently associated with a given hardware device.
Question
A protocol is a standardized means for coordinating an activity between two or more entities.
Question
The TCP program breaks messages down into packets.
Question
Routers use a routing table to tell it where to send traffic.
Question
The TCP layer packages each segmane into packets.
Question
A communications protocol is used to coordinate activity between a computer and a router.
Question
The process of changing public IP addresses into private IP addresses is called Network Address Translation (NAT).
Question
IP addresses are also called physical addresses.
Question
SMTP and HTTP are examples of Layer 5 protocols.
Question
In a private network, administrators cannot manually assign IP addresses.
Question
You are a master of the Japanese art of calligraphy. All your friends and family have told you that you should start a business selling your calligraphy on the Web. You would like to call it "Magic Strokes". Explain how you would go about deciding on a top- level- domain and registering your name. Go to icann.org and see if it is available and how much it would cost.
Question
What is a DNS and how does it work with IP addresses?
Question
What are the two kinds of IP addresses and how do they work?
Question
What is the TCP/IP- OSI architecture? Briefly describe how the five layers work.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/64
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 13: How the Internet Works
1
Public IP addresses are valid within:

A) a LAN.
B) a root server.
C) the Internet.
D) a WAN.
E) a system.
C
2
A service that provides temporary private IP addresses to computer users is called:

A) LAN IP.
B) DNS.
C) DHCP.
D) TCP/IP.
C
3
The is the process of changing public IP addresses into private IP addresses.

A) conversion
B) IEEE
C) NAT
D) OSI
E) MAC addresses
C
4
Routers and other devices provide the service of:

A) URL registration.
B) traffic maintenance.
C) NAT.
D) programming support.
E) query support.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
5
Switches work with at Layer 2.

A) NAT
B) MAC addresses
C) ISPs
D) frames
E) packets
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
6
The Internet is based on a packet- switching protocol called:

A) NAT.
B) SOHO.
C) SMTP.
D) ftp.
E) TCP/IP.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
7
208.77.188.103 is an example of a(n) .

A) Domain registration
B) DNS
C) IP address
D) Domain name
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
8
Routers work with at Layer 3.

A) frames
B) MAC addresses
C) packets
D) NAT
E) ISPs
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
9
licenses other agencies to register unique domain names and their associated IP addresses.

A) SOHO
B) DNS
C) ICANN
D) IETF
E) DSL
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
10
A document's address on the web is its .

A) DNR
B) ICAAN
C) TLD
D) DNS
E) URL
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
11
is a standard email protocol.

A) FTP
B) HTTP
C) TCP/IP
D) OSI
E) SMTP
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
12
A resolves domain names into IP addresses.

A) DHCP
B) DNS
C) LAN IP
D) TCP/IP
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
13
A(n) program examines your email and attachments and breaks a lengthy message into pieces called segments.

A) SMTP
B) ftp
C) http
D) OSI
E) TCP
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
14
Every domain name in the world is .

A) resolved
B) unique
C) saved on every computer
D) available
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
15
ICANN manages thirteen _ that maintain a list of IP addresses of servers that resolve each type of TLD.

A) TLD servers
B) DNS servers
C) URL servers
D) root servers
E) cache servers
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
16
Public IP addresses are converted to private ones and vice versa using:

A) ATM.
B) NAT.
C) )NET.
D) MAC.
E) PSDN.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
17
Private IP addresses are valid within:

A) the Internet.
B) a system.
C) a LAN.
D) a WAN.
E) a root server.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
18
The protocol is used for the processing of Web pages.

A) social
B) TCP/IP
C) ftp
D) http
E) OSI
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
19
administers domain name registration.

A) ICAAN
B) URL
C) TLD
D) ICANN
E) DNR
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
20
In the various layers of a network architecture, a is a set of rules that accomplish the tasks assigned to that layer.

A) protocol
B) frame
C) models
D) logic
E) segment
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
21
IP addresses are also called _.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
22
The network architecture is divided into five layers.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
23
The process of changing a name into its IP address is called the domain name.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
24
TCP is a communications protocol that helps break messages and files into .
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
25
A picture file attached to an email message will probably be broken into chunks or
of data when transmitted over a variety of networks to its eventual destination.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
26
Domain names are resolved into IP addresses by the _ _.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
27
is a protocol used to copy files from one computer to another.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
28
The last letters in any domain name are referred to as the _ .
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
29
maintain lists of IP addresses that resolve each type of top- level domain.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
30
URL stands for .
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
31
A network
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
32
The converts user- friendly names into their IP addresses.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
33
provides temporary private IP addresses to computer users.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
34
A network is a set of rules for accomplishing the functions of a particular layer.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
35
SMTP is an example of a network .
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
36
Network devices have two addresses; a physical MAC address and a logical .
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
37
is an unrestricted top- level domain that was intended for network providers.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
38
The letters in a domain name are known as the top- level domain name.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
39
A network has a table of data to help route traffic to the right destination.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
40
is a nonprofit organization that is responsible for administering the registration of domain names.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
41
Email programs operate primarily at the transport layer.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
42
File Transfer Protocol is an application- layer protocol.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
43
The Internet has adopted the TCP/IP- OSI architecture.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
44
Every NIC is given a MAC address at the factory.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
45
Switches employ a table to tell it where to direct traffic.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
46
The Internet Engineering Task Force developed a five layer protocol architecture known as TCP/IP- OSI.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
47
The ISO developed TCP/IP layered protocol.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
48
In most cases, when you plug your computer into a network, a program in Windows or other operating system will search that network for a DHCP server.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
49
Not every layer has a protocol associated with it.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
50
The DNS converts IP addresses into user- friendly domain names.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
51
IP addresses are not permanently associated with a given hardware device.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
52
A protocol is a standardized means for coordinating an activity between two or more entities.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
53
The TCP program breaks messages down into packets.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
54
Routers use a routing table to tell it where to send traffic.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
55
The TCP layer packages each segmane into packets.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
56
A communications protocol is used to coordinate activity between a computer and a router.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
57
The process of changing public IP addresses into private IP addresses is called Network Address Translation (NAT).
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
58
IP addresses are also called physical addresses.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
59
SMTP and HTTP are examples of Layer 5 protocols.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
60
In a private network, administrators cannot manually assign IP addresses.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
61
You are a master of the Japanese art of calligraphy. All your friends and family have told you that you should start a business selling your calligraphy on the Web. You would like to call it "Magic Strokes". Explain how you would go about deciding on a top- level- domain and registering your name. Go to icann.org and see if it is available and how much it would cost.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
62
What is a DNS and how does it work with IP addresses?
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
63
What are the two kinds of IP addresses and how do they work?
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
64
What is the TCP/IP- OSI architecture? Briefly describe how the five layers work.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 64 flashcards in this deck.