COSC 101 COMPUTER LITERACY CHAPTER 13 QUIZ Name______________________ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1)
COSC 101 COMPUTER LITERACYCHAPTER 13 QUIZ
Name______________________ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
1)
Who funded the development of technologies that would eventually become the Internet?
1)
_______ A)
Russia
B)
the United States government C)
Japan
D)
the United Nations
2)
Which of the following entities does NOT play a role in the governance and deployment of the Internet?
2)
_______ A)
Internet Corporation for Assigned Names and Numbers (ICANN) B)
World Wide Web Consortium (W3C) C)
Internet Architecture Board (IAB) D)
Internet Society (ISOC)
3)
The organization responsible for the Internet's domain name system and IP address allocation is
3)
_______ A)
ISOC.
B)
IAB.
C)
ICANN.
D)
W3C.
4)
________ is a consortium of more than 400 member organizations that develops Web protocols.
4)
_______ A)
ICANN
B)
W3C
C)
IETF
D)
ISOC
5)
The main paths of the Internet along which data travels the fastest are known collectively as the Internet ________.
5)
_______ A)
highway
B)
mainline
C)
spine
D)
backbone
6)
The majority of Internet communications follows the ________ model of network communications.
6)
_______ A)
peer-to-peer
B)
client/server C)
information exchange
D)
circuit switching
7)
________ are high-speed, fiber-optic communications lines.
7)
_______ A)
Cable lines
B)
T lines
C)
DSL lines
D)
OC lines
8)
One or more network switches to which ISPs connect are referred to as
8)
_______ A)
points of presence.
B)
router points. C)
gateway interfaces.
D)
Internet exchange points (IXPs).
9)
By using a(n) ________, individual Internet users are able to connect to their ISP.
9)
_______ A)
OC line
B)
backbone C)
T line
D)
point of presence (POP)
10)
By using common ________, networks can communicate even if they have different network topologies, transmission media, or operating systems.
10)
______ A)
file transmission rules
B)
communication protocols C)
circuit switching methods
D)
packet switching methods
11)
Used since the early days of the telephone, ________ uses a dedicated connection between two points that remains active during transmission.
11)
______ A)
packet switching
B)
TCP/IP C)
circuit switching
D)
packet routing
12)
At a minimum, what content must all data packets contain?
12)
______ A)
recipient's address, sender's address, reassembling instructions, and data B)
recipient's address, reassembling instructions, packet size, and data C)
sender's address, packet type, packet size, and data D)
sender's address, packet size, reassembling instructions, and data
13)
The original Internet backbone used T lines, which used
13)
______ A)
coaxial cable.
B)
fiber-optic lines. C)
microwave transmissions.
D)
twisted pair wires.
14)
Which of the following has the greatest bandwidth?
14)
______ A)
T-1 lines
B)
conventional telephone lines C)
T-3 lines
D)
OC lines
15)
Computers running specialized operating systems that enable them to host Web pages and other information are called
15)
______ A)
file servers.
B)
Web servers. C)
commerce servers.
D)
DNS servers.
16)
Computers that host software that enables users to purchase goods and services over the Internet are called ________ servers.
16)
______ A)
sales
B)
shopping
C)
online
D)
commerce
17)
.com and .org are examples of
17)
______ A)
top-level domains.
B)
HTML tags. C)
second-level domains.
D)
network prefixes.
18)
A set of rules for exchanging electronic information is called a
18)
______ A)
communication guide.
B)
connectivity scheme. C)
protocol.
D)
style guide.
19)
________ protocols are standards that are made public for access by any interested party.
19)
______ A)
Open system
B)
Guideline
C)
Proprietary
D)
Standard
20)
________ uses a dedicated connection between two points that remains active for the duration of transmission.
20)
______ A)
A closed circuit
B)
Circuit switching C)
Packet switching
D)
An open circuit
21)
When data is broken into smaller chunks to be sent over various routes at the same time, it is called
21)
______ A)
handshaking.
B)
packet switching. C)
packaging.
D)
circuit switching.
22)
BitTorrent is an example of a popular file-sharing service that uses
22)
______ A)
peer-to-peer mode.
B)
handshaking. C)
client/server mode.
D)
telnet.
23)
The protocol that prepares data for transmission but has no resending capabilities is
23)
______ A)
UDP.
B)
HTTP.
C)
TCP.
D)
Telnet.
24)
The protocol that transfers HTML data from servers to browsers is
24)
______ A)
UDP.
B)
FTP.
C)
TCP.
D)
HTTP.
25)
The protocol that enables logging in to a remote computer and working on it as if you were sitting in front of it is
25)
______ A)
MIME.
B)
HTTP.
C)
UDP.
D)
Telnet.
26)
Which of the following specifications is used to simplify attachments to e-mail messages?
26)
______ A)
Telnet
B)
UDP
C)
MIME
D)
FTP
27)
A unique number that identifies a computer, server, or device connected to the Internet is called a(n)
27)
______ A)
IP address.
B)
TCP address. C)
NetBIOS address.
D)
CGI address.
28)
Internet Protocol version 4 (IPv4), created in the early 1980s, allows about __________ IP addresses.
28)
______ A)
400 million
B)
4 trillion
C)
4 billion
D)
40 billion
29)
An IP address that is assigned from an available pool of IP addresses is called a(n)
29)
______ A)
static address.
B)
dynamic address. C)
assigned address.
D)
mobile address.
30)
IPv6 uses what number system to create IP addresses?
30)
______ A)
decimal
B)
hexadecimal
C)
octal
D)
binary
31)
An IP address that does not change and is usually assigned manually by a network administrator is called a(n)
31)
______ A)
static address.
B)
fixed address. C)
stationary address.
D)
dynamic address.
32)
A ________ server takes a pool of IP addresses and shares them with hosts on the network on an as-needed basis.
32)
______ A)
DOM
B)
CGI
C)
CDIR
D)
DHCP
33)
Which of the following statements concerning IPv4 addresses is FALSE?
33)
______ A)
The addresses contain four octets. B)
The addresses are 16-bit numbers. C)
IPv4 is the original IP address scheme. D)
In binary, each octet of an IP address contains eight positions.
34)
Which of the following statements concerning IP addresses is TRUE?
34)
______ A)
Static IP addresses change often. B)
ISPs must maintain a pool of IP addresses for all of their subscribers. C)
Dynamic IP addresses are assigned manually by a network administrator. D)
Dynamic addressing is normally handled by DHCP.
35)
________ provides a methodology whereby your browser can request that a program be executed instead of just being delivered to the browser.
35)
______ A)
HTML
B)
FTP
C)
UDP
D)
CGI
36)
The root DNS servers know the location of all DNS servers that contain the master listings for an entire
36)
______ A)
subdomain.
B)
IP address. C)
top-level domain.
D)
Web site.
37)
A(n) ________ contains text that is linked to other documents or media.
37)
______ A)
hypertext document
B)
CGI script C)
applet
D)
style sheet
38)
________ creates a secure connection between a client and a server and can safeguard your credit card information.
38)
______ A)
VRML
B)
SSL
C)
HTML
D)
XML
39)
Which of the following statements concerning HTML and XHTML is FALSE?
39)
______ A)
HTML and XHTML documents are merely text documents with tags applied to them. B)
XHTML is the successor to HTML. C)
HTML and XHTML are sets of rules for marking up blocks of text for display by a Web browser. D)
HTML and XHTML are considered server-side programs.
40)
Text such as <b><i>This should be bolded and italicized.</i></b> is an example of an HTML
40)
______ A)
marker.
B)
script.
C)
instruction.
D)
element.
41)
It is estimated that ________ percent of e-mail is spam.
41)
______ A)
50
B)
90
C)
10
D)
25
42)
The ability of two or more people to communicate in text over the Internet in real time is called
42)
______ A)
instant messaging.
B)
remote handshaking. C)
VoIP.
D)
texting.
43)
________ are lists of statements that use a single location to specify how to display HTML/XHTML elements.
43)
______ A)
Applets
B)
Key pairs C)
HTML tags
D)
Cascading style sheets (CSS)
44)
What is the range of normal Wi-Fi connectivity?
44)
______ A)
300 feet
B)
50 feet
C)
31 miles
D)
1 mile
45)
What is the range of normal WiMAX connectivity?
45)
______ A)
300 feet
B)
31 miles
C)
50 feet
D)
1 mile
46)
Currently used in Europe and Australia, ________ uses a normal wall outlet to connect to the Internet.
46)
______ A)
AJAX
B)
VoIP
C)
BPL
D)
WiMAX
47)
________ switching has been used since the early days of the telephone for establishing communication.
47)
______ A)
Packet
B)
Static
C)
Dynamic
D)
Circuit
48)
Which protocol uses standard Internet connections to make phone calls over the Internet?
48)
______ A)
VoIP
B)
SMTP
C)
FTP
D)
HTTP
49)
________ delivers business services online that were previously delivered locally by company-owned IT departments.
49)
______ A)
Cloud computing
B)
Server-side programming C)
Secure Sockets Layer
D)
Distributed data service
50)
Cascading style sheets have a hierarchy of styles that include all of the following EXCEPT
50)
______ A)
external
B)
independent
C)
inline
D)
embedded
1)
B 2)
A 3)
C 4)
B 5)
D 6)
B 7)
D 8)
D 9)
D 10)
B 11)
C 12)
A 13)
D 14)
D 15)
B 16)
D 17)
A 18)
C 19)
A 20)
B 21)
B 22)
A 23)
A 24)
D 25)
D 26)
C 27)
A 28)
C 29)
B 30)
B 31)
A 32)
D 33)
B 34)
D 35)
D 36)
C 37)
A 38)
B 39)
D 40)
D 41)
B 42)
A 43)
D 44)
A 45)
B 46)
C 47)
D 48)
A 49)
A 50)
B