Computer Concepts

Computing

Quiz 6 :

The Internet

Quiz 6 :

The Internet

Question Type
search
arrow
Your friend is setting up a cable Internet connection. You recommend that she connect a router between her computer and the cable modem, and explain that network img translation can help to secure her computer against intrusions.
Free
Essay
Answer:

Answer:

Address
• Network Address Translation (NAT) is used to keep track of the packets with respect to their IP address.
• Since, it is used as a security technique, I request my friend to use NAT between the router and system or computer to set a cable internet connection.
Therefore, the appropriate word to fill in the blank is Address.

Tags
Choose question tag
close menu
arrow
Make a timeline of events associated with the evolution of the Internet.
Free
Essay
Answer:

Answer:

Evolution of internet
Evolution of computers is comprised of mainly 3 events given below:
1. Creation of ARPANet
2. Development of TCP
3. E-mail feature
The explanation of all 3 events is given below:
1. Creation of ARPANet: After the launch of first artificial satellite "Sputnik" in 1957, the internet was started. In 1969 ARPANet was created by ARPA which is advanced research project agency. The main purpose of ARPA is to create a system of internetworks with which many separate networks can be joined to form a large network. Internet is a collection of Internet service provider which handles their own network and client and also connects with other network.
2. Development of TCP: In 1982, TCP (Transmission control protocol) was developed. A protocol is a set of rules which is used to transfer data between networks. Two or more networks when connected to each other forms internet. Internet was designed for communication between networks.
E-mail feature: When internet was created, it was not so friendly and hence it was used by engineers and scientists. Person who wants to use internet has to learn a lot of complex things about internet. Email was added to internet system in 1972. "@" symbol was used in emails for connecting username with the address. A lot of protocols like TELNET, FTP, PPP, TCP, IP etc were created to govern the connection.
Now, internet is too huge. A lot of users are accessing the internet as per the need. A large amount of information is stored on the internet about almost each and every topic. And internet is very necessary for students, teachers and everyone who want to learn anything can use internet.

Tags
Choose question tag
close menu
arrow
Describe the difference between Ping and Traceroute by giving an example of when each would be used.
Free
Essay
Answer:

Answer:

Difference between Ping and Traceroute
Ping and Traceroute are the utilities used by computers. Ping utility is used determine the accessibility of a specific IP address and Traceroute utility is used for tracing the data packet from user computer to internet host.
Some differences between Ping and Traceroute are given below:
img Example: If user wants to use both utilities for IP (google.com), then in the command prompt, the commands for Ping and Tracert should be entered.
For Ping: The command that user enters for Ping is 'Ping google.com' the output that will be obtained is shown below:
img For Traceroute: The command that user enters for Ping is 'Tracert google.com' the output that will be obtained is shown below:
img

Tags
Choose question tag
close menu
arrow
Draw a conceptual diagram illustrating the Internet backbone, NAPs, NSPs, routers, and ISPs. Extend the diagram to show how computers on a LAN access the Internet through a single DSL modem.
Essay
Answer:
Tags
Choose question tag
close menu
arrow
List the advantages and disadvantages of dial-up, cable, DSL, satellite, and fixed wireless Internet services. List the Internet access methods in which upstream transmission rates differ from downstream rates.
Essay
Answer:
Tags
Choose question tag
close menu
arrow
Explain the differences between static IP addresses, dynamic IP addresses, private IP addresses, and domain names.
Essay
Answer:
Tags
Choose question tag
close menu
arrow
Explain the advantages of mobile broadband services compared to WAP service.
Essay
Answer:
Tags
Choose question tag
close menu
arrow
Your friend wants you to follow her tweets and asks if you have a(n) img account.
Essay
Answer:
Tags
Choose question tag
close menu
arrow
A news article states that hackers tried to redirect unsuspecting users to infected sites using a technique called img cache poisoning. (Hint: Use the acronym.)
Essay
Answer:
Tags
Choose question tag
close menu
arrow
List at least five protocols used on the Internet and describe what they are used for.
Essay
Answer:
Tags
Choose question tag
close menu
arrow
List the options for mobile and portable Internet access, and explain their strengths and weaknesses.
Essay
Answer:
Tags
Choose question tag
close menu
arrow
Your friend, a film student, has created a 20-minute short film that she wants to distribute to friends. The file is much too large to be an e-mail attachment and she doesn't have access to a(n) img server. You suggest that she try posting it at a(n) img P2P file sharing site where a swarm of computers can assist with the downloads.
Essay
Answer:
Tags
Choose question tag
close menu
arrow
Give examples of synchronous and asynchronous communications offered on the Internet.
Essay
Answer:
Tags
Choose question tag
close menu
arrow
Suppose that you decide to open a little Web store to sell handcrafted pottery. Your Web site will need a(n) img IP address, and you'll want to register a(n) img name.
Essay
Answer:
Tags
Choose question tag
close menu
arrow
List two examples of distributed grid computing and two examples of cloud computing.
Essay
Answer:
Tags
Choose question tag
close menu
arrow
Explain how Voice over IP works, and compare it to cell phone and land line services.
Essay
Answer:
Tags
Choose question tag
close menu
arrow
You're installing a high-speed Internet connection. The modem has a cable like the one shown at right. This modem is designed to connect to a computer's img port.
Essay
Answer:
Tags
Choose question tag
close menu
arrow
Your Internet access seems very slow one day. You might be able to use a networking utility called img to discover the source of the slowdown.
Essay
Answer:
Tags
Choose question tag
close menu
arrow
You frequently use public Wi-Fi hotspots in cafes and other locations. To keep your passwords and other confidential data safe, you work with your employer to install a(n) img that encrypts the data you transmit over the Internet. (Hint: Use the acronym.)
Essay
Answer:
Tags
Choose question tag
close menu
arrow
Suppose you have installed a cable modem on a standalone PC. To secure your computer, you should activate img software to filter packets entering and leaving your computer. img
Essay
Answer:
Tags
Choose question tag
close menu
Showing 1 - 20 of 48