The Internet - APCSP

studied byStudied by 10 people
5.0(1)
get a hint
hint

Which of the following best explains what happens when a new device is connected to the Internet?

1 / 21

22 Terms

1

Which of the following best explains what happens when a new device is connected to the Internet?

An Internet Protocol (IP) address is assigned to the device.

New cards
2

Which of the following activities poses the greatest personal cybersecurity risk?

Purchasing a couch by emailing a credit card number to the couch owner.

New cards
3

Which of the following is LEAST likely to indicate a phishing attack?

An email from your water utility company asks you to enter your date of birth and social security number for verification purposes.

New cards
4

Which of the following is considered an unethical use of computer resources?

Searching online for the answers to CodeHS exercises and quizzes.

New cards
5

Which of the following are true statements about digital certificates in Web browsers?

I and II

New cards
6

According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?

about.example.com

New cards
7

A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent back to the user?

The file is broken into packets and sent over a network. The packets must be reassembled by the user's computer when they are received. If any packets are missing, the browser re-requests the missing packets.

New cards
8

Which of the following is a benefit of the fault-tolerant nature of Internet routing?

The ability to provide data transmission even when some connections between routers have failed

New cards
9

Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes whether these two computers can communicate with each other across the Internet?

The computers can communicate directly because Internet communication uses standard protocols that are used by all computers on the Internet.

New cards
10

A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet.

The network is considered fault-tolerant because there are redundant paths between each pair of devices.

New cards
11

Which of the following actions is LEAST likely to be effective in this purpose?

Putting helpful tips for operating computers on the city government website.

New cards
12

An IPv4 address has 32 bits, so there are 232 (over 4 billion) possible IPv4 addresses. Since the Internet is gaining devices quickly, we will soon surpass 232 unique devices on the Internet.

New cards
13

In anticipation of all the new Internet devices, we are in the process of switching to IPv6, which uses 128 bits for a single address. That's 96 extra bits to represent one address!

New cards
14

Which of the following statements correctly describes how many more addresses will be possible to represent by switching from IPv4 to IPv6?

2^96 times as many addresses can be represented with IPv6.

New cards
15

Which of the following would pose the greatest threat to a user's personal privacy if it were to be leaked to the public?

The user's browser cookies.

New cards
16

What is a Distributed Denial of Service (DDoS) attack?

An attempt to deny access to a website by flooding the website's servers with millions of requests from different computers.

New cards
17

Which of the following is a benefit that online shopping websites provide over brick and mortar stores?

Users can easily see product reviews and determine if an item has been satisfactory for a large number of people.

New cards
18

Consider the following network diagram:

New cards
19

Each box represents a device connected to the network, each line represents a direct connection between two devices.

New cards
20

Which of the following statements are true about this network:

New cards
21

I - The network is fault tolerant. If one connection fails, any two devices can still communicate.

New cards
22

II - Computers C and E need to first communicate with at least one other device in order to communicate with each other.

I only

New cards

Explore top notes

note Note
studied byStudied by 37 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 30 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 11 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 25 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 29 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 47 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard89 terms
studied byStudied by 16 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard54 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard65 terms
studied byStudied by 88 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard32 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard36 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard64 terms
studied byStudied by 21 people
Updated ... ago
5.0 Stars(3)
flashcards Flashcard80 terms
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard20 terms
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)