Unit Two: Using Objects

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/129

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

130 Terms

1
New cards
Internet
the publicly available worldwide system of interconnected computer networks (Links to an external site.) that transmit data by packet switching (Links to an external site.) over the Internet Protocol (Links to an external site.)
2
New cards
World Wide Web
information system where documents and other web resources are identified by Uniform Resource Locators (URLs, such as https://example.com/), which may be interlinked by hypertext, and are accessible over the Internet
3
New cards
computer device
electronic devices which take inputs, process the inputs and then calculate results from the inputs
4
New cards
computer system
the combination of hardware, software, user and data
5
New cards
computer network
computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes
6
New cards
IP address
unique number assigned to each device on the internet
7
New cards
protocol
an agreed upon set of rules that specify the behavior of some system
8
New cards
internet protocol
a protocol for sending data across the Internet that assigns unique numbers(IP addresses) to each connected device
9
New cards
router
A type of computer that forwards data across a network
10
New cards
redundancy
inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network
11
New cards
fault tolerant
Can continue to function even in the event of an individual component failures, important because elements of complex systems like a computer network fail at unexpected times, often in groups
12
New cards
packet
Chunks of data and its metadata used to route and reassemble information, sent over a network
13
New cards
packet metadata
Data added to packets to help route them through the network and reassemble the original message
14
New cards
Transmission Control Protocol (TCP)
takes inventory of all packets in the data stream to ensure they are successfully sent and received
15
New cards
Hypertext Transfer Protocol (HTTP)
a protocol for computers to request and share the pages that make up the world wide web on the Internet
16
New cards
Domain Name System (DNS)
the system responsible for translating domain names like example.com into IP addresses
17
New cards
digital divide
differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics
18
New cards
net neutrality
concept that all data on the internet should be treated equally by corporations, such as internet service providers, and governments, regardless of content, user, platform, application or device
19
New cards
internet censorship
the control or suppression of what can be viewed, accessed, or published on the internet. It may be carried out by the government or by private organizations
20
New cards
IPv6
Internet Protocol version 6 that was added so to make room for more IP addresses as the Internet grows
21
New cards
How are protocols like HTTP, SMTP, and IP created?
A worldwide group of volunteers draft, revise, and publish protocols.
22
New cards
Why is the Domain Name System useful?
Domain names are easier for humans to remember than the IP addresses of frequently visited websites
23
New cards
What are two standards of the Internet?
Internet standards ensure that hardware and software created by different companies will be able to communicate with each other online, Internet standards are specific procedures and rules that are created in order to benefit the Internet Community
24
New cards
The Internet Engineering Task Force makes decisions by rough consensus, not by the majority of votes. What does this ensure about the Internet?
It is incredibly difficult to charge the common protocols and standards of the internet once they have been created.
25
New cards
Which of the following statements about packets is TRUE?
Packets must be sent in order so they can be reassembled at end host.
26
New cards
bandwidth speed
the maximum amount of data that can be sent in a set amount of time
27
New cards
open use protocols
Open protocols provide a way to standardize data transmission between different devices
28
New cards
Which of the following best describes the result of using 64-bit integers instead of 32-bit integers?
2^32
29
New cards
Which of the following can be represented by a single binary digit? Select two answers.
The value of a Boolean variable
The remainder when dividing a whole number by 2
30
New cards
Why was IPv6 introduced as the new version of the Internet Protocol?
With only 32 bit IP addresses, the older version could not support the large number of devices connecting to the internet.
31
New cards
Which of the following best explains what happens when a new device is connected to the Internet?
An Internet Protocol (IP) address is assigned to the device
32
New cards
Which of the following are ways that the Internet has changed the way people collaborate? Select TWO answers.
-Video Conferencing software enables people to talk to co-worker's and friends
-Cloud Computing allows people to work on the same document from different areas of the World
33
New cards
Which of the following best describes the ability of the two computers to communicate with each other across the Internet?
The computers can communicate directly because Internet communication uses standard protocols.
34
New cards
Which of the following identifies a device using the internet?
IP address
35
New cards
How are protocols like HTTP, TCP, and IP created?
A worldwide group of volunteers draft revise, and publish protocols
36
New cards
Which of the following statements are true of the standards of the internet? Select TWO answers.
-Internet standards are specific procedures and rules that are created in order to benefit the Internet Community
-Internet standards ensure that hardware and software created by different companies will be able to communicate with each other online.
37
New cards
The new version of the Internet Protocol, IPv6, allows for IP addresses that are 128 bits long, How many possible IP addresses are available with IPv6?
2^128
38
New cards
Which of the following statements are true of the Internet Engineering Task Force (IETF)? Select TWO ANSWERS.
-The most important work of the IETF is to create and maintain protocols like HTTP and TCP
-The IETF is completely made up of volunteers from all over the world who do not need to attend meetings in person to participate
39
New cards
Which of the following statements about packets is TRUE?
none
40
New cards
Which of the following statements is true regarding the networks that make up the Internet? Select TWO answers.
-All devices that are connected on a network use the same protocol
-Different types of networks can be connected in order to transfer data and communicate
41
New cards
Which of the following statements about redundancy on the Internet are TRUE? Select TWO answers
-Redundancy has good qualities
42
New cards
many devices can be added to the network without affecting traffic
-Redundancy has good qualities
43
New cards
if several routers fail, data can still be transferred
44
New cards
Which of the following statements are TRUE of the Internet? Select TWO ANSWERS.
-Most data can follow more than one path to the destination device
-Most network routing on the Internet is hierarchical
45
New cards
Which of the following statements is an accurate interpretation of bandwidth speed?
The number of files that can be downloaded in a set amount of time
46
New cards
Tom sends Troy an email, Which of the following statements about the way the email sent is NOT true?
The packets arrive at Troy's computer in the correct order so that they can be reassembled correctly.
47
New cards
Desktop computers, laptops, tablets, smartphones, and other devices are made by different companies, yet they are all able to access the Internet. This has led to the widespread use of the Internet from many different kinds of devices. Which of the following makes this possible?
Open standards and protocols
48
New cards
Which of the following is an example of a subdomain of college.org to the domain name system (DNS)?
contact.college.org
49
New cards
What is the primary reason that routing on the internet is redundant?
Networks are still available in case of a path rŠ¾uter failure
50
New cards
Which of the following statements about TCP/IP is FALSE?
TCP/IP are the only protocols necessary to send and receive information over the Internet
51
New cards
Which of the following statements about packets is FALSE?
The packet does not contain information about the sender's IP address
52
New cards
Many networks are set up using a hierarchical architecture to create a "backbone" network. In this system, several connected routers act as the backbone, and many smaller LANs are connected to the backbone. This is much different than having a system where every router is connected to every other router. What are the benefits of the hierarchical approach to setting up a network? Select TWO answers
-It makes the process of transferring data much more efficient
-It decreases congestion in the network
53
New cards
Which of the following best describes the basic idea of fault tolerance?
If part of the system fails, the operation continues without interruption
54
New cards
Which of the following best explains how messages are typically transmitted over the Internet?
The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device.
55
New cards
Which of the following domain names are part of the same top tier? Select TWO ANSWERS
www.collegeB.edu
www.collegeA.edu
56
New cards
New websites are being created every day, yet internet users are still able to navigate the web and access information at the same speed. Which of the following most makes this possible:
Hierarchical DNS
57
New cards
A new device is given as IP address and added to a network so that it can access the Internet. Large amounts of files are uploaded and downloaded on this new device, but other users who were already online do not experience any difference in performance. Which of the following enables this phenomenon?
Redundant routers
58
New cards
Which of the following statements is TRUE regarding Internet protocols?
All of the above are false.
59
New cards
Which of the following is a primary reason for the use of open protocols on the Internet?
Open protocols provide a way to standardize data transmission between different devices.
60
New cards
Each packet being routed around the internet contains header information about the packet itself, and it also contains part of the file being transferred. Imagine you are sending an image of a basketball player from computer A to computer B across the Internet. Of the following, which information would be contained in each packet's header? Select TWO.
-The sequence number of the packet in relation to all other packets of the image
-The IP address of the destination computer
61
New cards
Which of the following best describes the relationship between the World Wide Web and the Internet?
The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet.
62
New cards
How does the hierarchical architecture of the DNS help the system scale?
Domain names have set structure, making them easy to organize and manage
63
New cards
You have a coordinate grid that is 96 x 96. Assuming that you encode the x and y coordinate as separate numbers, what is the minimum number of bits that you will need to encode a coordinate in that space?
14: 7 bits to get 96 and 7+7=14
64
New cards
How many bits are necessary to convert 128 from decimal (base ten) to binary (base two)?
8
65
New cards
Two students are sending messages to one another using a 5-bit protocol. They decide to modify their protocol to 7-bit messages. How many move values can be represented in a 7-bit message than a 5-bit message?
4 times as many
66
New cards
A digital certificate is an attachment to an electronic message used for security purposes. The most common use of a digital certificate is to verify that a user sending a message is who he or she claims to be. Select TWO answers.
-The most common use of a digital certificate is to verify that a user sending a message is who he or she claims to be. and to provide the receiver with the means to encode a reply
-Is an attachment to an electronic message used for security purposes
67
New cards
Which of the following do HTTPS and SSL procedures ensure? Select TWO ANSWERS.
-That messages being sent are encrypted and thus secure
-That the identity of the server involved in an interaction can be trusted
68
New cards
Digital certificates are issued by ...?
A certified instructor by Certification Authorities (CA). Like a central trusted body is used to issue driving licenses or passports, a CA fulfill the role of the Trusted Third Party by accepting Certificate applications from entities, authenticating applications, issuing Certificates and maintaining status information about the Certificates issued
69
New cards
TCP/IP does all of the below EXCEPT:
choose the path needed (which routers) to move a message from point A to point B
70
New cards
If the post office delivered mail exactly like the routers deliver messages on the Internet, which of the following statements would be true? SELECT 2 ANSWERS
-The mailman would sometimes take a different path to deliver each letter to your home
-Letters would be written on the outside of the envelope for all to read instead of letters put inside envelopes
71
New cards
The Internet, A Mobile Hotspot, School Computer Lab are examples of what?
IP
72
New cards
The _____________ takes inventory of all packets in the datastream to ensure they are successfully sent and received.
TCP
73
New cards
Which of the following refers to chunks of data and their metadata, used to route and reassemble information on the Internet ?
Packets
74
New cards
Which term refers to the way in which information travels on the Internet, not as a single piece but in chunks?
datastreams
75
New cards
Which of the following terms can be described as sending all packets without checking whether they were received or ordered properly?
UDP
76
New cards
Which of the following is the best description of the term Net Neutrality?
It is the principle that Internet service providers (ISPs) must treat all Internet communications equally, and not discriminate or charge differently based on user, content, website, platform, application, type of equipment, source address, destination address, or method of communication.
77
New cards
Which of the following is the best description of the term Internet censorship ?
It is the control or suppression of what can be accessed, published, or viewed on the Internet enacted by regulators, or on their own initiative. Individuals and organizations may engage in self-censorship for moral, religious, or business reasons, to conform to societal norms, due to intimidation, or out of fear of legal or other consequences
78
New cards
Which of the following is the best description of the term Digital Divide?
It is the growing gap between the underprivileged members of society, especially the poor, rural, elderly, and handicapped portion of the population who do not have access to computers or the internet
79
New cards
and the wealthy, middle-class, and young Americans living in urban and suburban areas who have access
80
New cards
The colors of pixels in a digital image are often represented by red, green, and blue values between 0 and 255 (an RGB triplet). A photographer is manipulating a digital image to lighten it because of the RGB values in the image are less than 100, making it very dark. He does this by adding 20 to the R, G, and B values of each pixel, then overwriting the original image. What type of transformation is the photographer using on the digital image?

A. Lossless transformation
B. Lossy transformation
C. Multiband transformation
D. Chrome Sampling transformation
lossless transformation
81
New cards
Which of the following is true about data compression?
There are tradeoffs involved in choosing a compression technique for storing and transmitting data
82
New cards
A video streaming Web site uses 32-bit integers but has recently upgraded to 64 bit integers. Why?
2^32 more bits can be represented
83
New cards
MP3 software works to cut down audio files using what form of compression?
lossy compression
84
New cards
metadata
shows the app interface and the bits used behind the scenes
85
New cards
What 3 bits of data gives us green?
111
86
New cards
4 bit number for 13
1101
87
New cards
What is the minimum number of bits you would need to encode the 26 letters of the alphabet plus a space and the digits 0- 9 for a total of 37 characters?
6 bits 000000
88
New cards
Convert the following number to a decimal value: AA (hex)
170
89
New cards
IPv6
The Internet Protocol version 6 provides a large number of new addresses to route Internet traffic, using "from" and "to" addresses written as colon-hexadecimal notation, such as "fe80::42:acff:feaa:1bf0".
90
New cards
Which of the following statements are true about routers and routing on the Internet? Choose two answers.
-A packet traveling between two computers on the Internet may be rerouted several times along the way or even dropped
-Routers act independently and route packets as they see fit
91
New cards
Which of the following BEST describes how protocols on the Internet (e.g. IP, TCP, HTTP) make use of abstraction to accomplish their respective purposes?
Low level protocols can provide functionality to high level protocols without revealing the details of how this is accomplished
92
New cards
Which of the following IS true about TCP/IP packets?
-Packets are numbered so if they arrive out of order they can be reassembled
-Packets can be routed on different paths from sender to receiver.
-Messages are broken into packets to improve the reliability of the Internet
93
New cards
How does a computer resolve a domain name into an IP address?
It asks a DNS server for the corresponding IP address
94
New cards
The world is currently in a transition to using IPv6, a newer version of the IP protocol that uses 128-bit addresses instead of 32-bit addresses used by IPv4. What is the main problem that IPv6 was created to solve?
32-bit addresses could not ensure that every internet-connected device can receive a unique IP address
95
New cards
Given the following code, what is printed to the console? print "3" + "4"
34
96
New cards
What is a Distributed Denial of Service (DDoS) attack?
An attempt to compromise a single target by flooding it with requests from multiple systems
97
New cards
Which of the following scenarios is most characteristic of a phishing attack?
You get an email from the IT support desk that asks you to send a reply email with your username and password to verify your account.
98
New cards
Which of the following is an example of how the digital divide can affect data collection and analysis?
Members of an online social network are asked to watch a streaming video about a current event, and answer a survey. People on low-bandwidth networks that cannot handle streaming video would be unlikely to respond.
99
New cards
A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet. Which of the following activities is LEAST likely to be effective in this purpose?
Putting all government forms on the city Website
100
New cards
Which of the following has the greatest potential for compromising a user's personal privacy?
A group of cookies stored by the user's Web browser