1/212
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Computing device
a machine that can run a program
Computing system
a group of computers working together for a common purpose
Computing network
a group of connected computers that can send or receive data
Path
a sequence of direct connections
Which of the following best describes the protocols used on the Internet?
A. The protocols of the Internet are designed by government agencies to ensure they remain free to use
B. The protocols of the Internet are secret to maintain the privacy and security of ppl using them
C. Each device connected to the Internet will use a protocol designed by the company that manufactured it
D. The protocols of the Internet are open and used by all devices connected to the network
D. The protocols of the Internet are open and used by all devices connected to the network
Jesse purchases a new smartphone and is immediately able to use it to send a photo over the Internet to a friend who lives in a different country. Which of the following is NOT necessary to make this possible?
A. Both devices are using the same shared and open protocols
B. A single direct connection is established between any two devices connected to the Internet
C. The data of the image is routed through a sequence of directly connected devices before arriving at its destination.
D. Both devices are directly connected to at least one part of the Internet
B. A single direct connection is established between any two devices connected to the Internet
Which of the following is true of how the Internet has responded to the increasing number of devices now using the network?
A. The Internet protocols are changed every year to adapt to the new devices that have been connected to the network
B. While the number of devices connected to the Internet has grown, the network itself has not grown
C. The protocols of the Internet were designed to scale as new devices are added
D. The protocols of the Internet are no longer necessary thanks to the large number of devices now connected to the network
C. The protocols of the Internet were designed to scale as new devices are added
Which of the following is true of how packets are sent through the Internet?
A. Packet metadata is only included on important packets to indicate they should get access to faster paths through the network
B. Packet metadata is used to route and reassemble information traveling through the Internet
C. Information sent through the internet is only encapsulated in packets if the message is too large to be sent as a datastream
D. Information sent through the internet is split into two packets, one which contains the message and another which contains the metadata
B. Packet metadata is used to route and reassemble information traveling through the Internet
Emilee is watching an online video. The video is being sent to her laptop by a server over the Internet which splits the video into packets and sends them in the order they appear in the video. Which of the following is true about how the packets will arrive at her computer?
A. The packets will always be received in the order that they were sent
B. Either every packet will reach her computer or none of them will.
C. Packets that arrive out of order will be sent back to the server.
D. The packets may arrive out of order
D. The packets may arrive out of order
Which of the following best describes the purpose of an IP address?
A. IP addresses provide a unique number for identifying devices that send and receive information on the Internet
B. IP addresses assist in the reconstruction of a message that has been divided into many packets
C. IP addresses indicate the location where an internet-connected computing device was manufactured
D. IP addresses indicate how many times an individual packet has been requested by a router
A. IP addresses provide a unique number for identifying devices that send and receive information on the Internet
Which of the following Internet protocols is MOST important in reassembling packets and requesting missing packets to form complete messages?
A. Transmission Control Protocol (TCP)
B. Internet Protocol (IP)
C. User Datagram Protocol (UDP)
D. HyperText Transfer Protocol (HTTP)
A. Transmission Control Protocol (TCP)
Which of the following Internet protocols is used to request and send pages and files on the World Wide Web?
A. Transmission Control Protocol (TCP)
B. Internet Protocol (IP)
C. User Datagram Protocol (UDP)
D. HyperText Transfer Protocol (HTTP)
D. HyperText Transfer Protocol (HTTP)
Two devices are connected to the Internet and communicating with one another. A squirrel chews through one of the wires in the network that is currently being used by the devices to communicate. The network immediately begins using a different path through the network and communication continues as normal.
This situation best exemplifies which principle?
A. fault-tolerance
B. scalability
C. protocol
D. pathing
A. fault-tolerance
An Internet Service Provider (ISP) is a company that builds routers and wired connections that allow individuals to access the Internet. An ISP is considering adding additional redundant connections to its network. Which of the following best describes why the company would choose to do so?
A. It costs less to design a network that is redundant