Deck 2: E-Commerce Infrastructure

Full screen (f)
exit full mode
Question
Where does TLS operate within TCP/IP?

A) between the Internet Layer and the Transport Layer
B) between the Transport Layer and the Application Layer
C) between the Network Interface Layer and the Transport Layer
D) between the Internet Layer and the Application Layer
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following occurred during the Commercialization phase of Internet development?

A) The fundamental building blocks of the Internet were realized in actual hardware and software.
B) Personal computers were invented.
C) The Domain Name System was introduced.
D) NSF privatized the operation of the Internet's backbone.
Question
During which period of time did the Institutionalization phase of Internet development take place?

A) 1950-1960
B) 1961-1974
C) 1975-1995
D) 1995-through the present
Question
Which of the following protocols is used to send mail to a server?

A) SMTP
B) FTP
C) HTTP
D) SSL
Question
________ is a utility program that allows you to check the connection between your client and a TCP/IP network.

A) Ping
B) Telnet
C) Tracert
D) Finger
Question
The Transport Layer of TCP/IP is responsible for which of the following?

A) placing packets on and receiving them from the network medium
B) addressing, packaging, and routing messages
C) providing communication with the application by acknowledging and sequencing the packets to and from the application
D) providing a variety of applications with the ability to access the services of the lower layers
Question
The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:

A) routing.
B) the Transmission Control Protocol.
C) packet switching.
D) the File Transfer Protocol.
Question
Which of the following is the core communications protocol for the Internet?

A) Telnet
B) FTP
C) TCP/IP
D) TLS
Question
The address used by a browser to identify the location of content on the Web is called:

A) a domain name.
B) a uniform resource locator.
C) an IP address.
D) a file path.
Question
________ is used to allow remote login on another computer.

A) Telnet
B) FTP
C) HTTP
D) SSL
Question
Which of the following statements about cloud computing is not true?

A) A public cloud is typically used by companies with stringent privacy and security requirements.
B) Dropbox is an example of a public cloud.
C) Hybrid clouds offer both public and private cloud options.
D) A private cloud may be hosted internally or externally.
Question
Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture?

A) fiber optics
B) Wi-Fi
C) IPv6
D) client/server computing
Question
Which of the following is not one of the basic technological foundations of the Internet?

A) client/server computing
B) FTP
C) TCP/IP
D) packet switching
Question
________ is a model of computing in computer processing, storage, software, and other services which are provided as a shared pool of virtualized resources over the Internet.

A) Client/server computing
B) P2P computing
C) Mobile computing
D) Cloud computing
Question
Which of the following are specialized computers that transmit message parcels along available Internet communication paths and on to their destinations?

A) routers
B) Web servers
C) IP servers
D) packet servers
Question
The Internet Layer of TCP/IP is responsible for which of the following?

A) placing packets on and receiving them from the network medium
B) addressing, packaging, and routing messages
C) providing communication with the application by acknowledging and sequencing the packets to and from the application
D) providing a variety of applications with the ability to access the services of the lower layers
Question
During which phase of the development of the Internet was the Domain Name System (DNS) introduced?

A) commercialization phase
B) institutional phase
C) innovation phase
D) consolidation phase
Question
An IPv4 address is expressed as a:

A) 32-bit number that appears as a series of four separate numbers separated by semicolons.
B) 64-bit number that appears as a series of four separate numbers separated by semicolons.
C) 64-bit number that appears as a series of four separate numbers separated by periods.
D) 32-bit number that appears as a series of four separate numbers separated by periods.
Question
Which of the following is not an advantage of client/server computing over centralized mainframe computing?

A) It is easy to expand capacity by adding servers and clients.
B) Each client added to the network increases the network's overall capacity and transmission speeds.
C) Client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer.
D) There is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down.
Question
The ________ allows a natural language expression, such as Google.com to represent a numeric IP address.

A) uniform resource locator system
B) Internet protocol addressing schema
C) domain name system
D) assigned numbers and names (ANN) system
Question
The Web runs in which layer of Internet architecture?

A) Network Technology Substrate layer
B) Middleware Services layer
C) Transport Services and Representation Standards layer
D) Applications layer
Question
The term latency refers to a delay that can be experienced in packet-switched networks.
Question
Which of the following protocols enables the exchange of routing information among different autonomous systems on the Internet?

A) HTTP
B) BGP
C) FTP
D) SMTP
Question
HTTP/2 is supported by almost all the leading web browsers.
Question
Amazon Web Services is an example of a private cloud.
Question
Which of the following is a utility program that allows you to track the path of a message sent from a client computer to a remote computer on the Internet?

A) Telnet
B) Ping
C) IMAP
D) Tracert
Question
The layer of Internet architecture that ties the applications to the communications network and includes security and authentication services is called the:

A) Network Technology Substrate layer.
B) Middleware Services layer.
C) Transport Services and Representation Standards layer.
D) Applications layer.
Question
Which of the following was the original purpose of the Internet?

A) to provide a network that would allow businesses to connect with consumers
B) to link large mainframe computers on different college campuses
C) to develop a military communications system that could withstand nuclear war
D) to enable government agencies to track civilian communications
Question
What are the essential characteristics of cloud computing?
Question
IMAP is the Internet protocol used by a browser to transfer web pages.
Question
FTP is the protocol that permits users to transfer files from a server to their client computer, and vice versa.
Question
What are the implications of cloud computing for e-commerce?
Question
TCP/IP operates in which layer of Internet architecture?

A) Network Technology Substrate layer
B) Middleware Services layer
C) Transport Services and Representation Standards layer
D) Applications layer
Question
Which of the following organizations monitor Internet policies and practices?

A) IETF
B) ISOC
C) W3C
D) ICANN
Question
Explain each of the three important concepts behind the Federal Networking Council's definition of the term Internet. Explain how each technology contributes to the functioning of the Internet today.
Question
Which of the following is a set of rules for transferring data?

A) protocol
B) packet
C) router
D) IP address
Question
In a hybrid cloud computing model, firms use their own infrastructure for their most essential core activities.
Question
Which of the following is not a basic type of cloud computing service?

A) IaaS
B) PaaS
C) SaaS
D) FiOS
Question
Which of the following are central directories that list all domain names currently in use for specific domains?

A) Web servers
B) root servers
C) client servers
D) DNS servers
Question
A private cloud is operated for the benefit of multiple firms.
Question
Which of the following is not a concern about IoT?

A) the falling cost of sensors
B) interoperability
C) security
D) privacy
Question
Bluetooth is a high-speed, fixed broadband wireless local area network for commercial and residential use.
Question
The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices.

A) Internet Engineering Steering Group (IESG)
B) World Wide Web Consortium (W3C)
C) Internet Engineering Task Force (IETF)
D) Internet Society (ISOC)
Question
All of the following are involved in the effort to create standards for IoT except:

A) AllSeen Alliance.
B) Industrial Internet Consortium.
C) Open Connectivity Foundation.
D) W3C.
Question
The major technologies used with wireless local area networks are:

A) Wi-Fi and Bluetooth.
B) Wi-Fi and WiMax.
C) Bluetooth and 3G.
D) WiMax and 3G.
Question
Which of the following statements about fiber-optic cable is not true?

A) It transmits more data at faster speeds than coaxial or twisted pair cable.
B) It is thinner and lighter than coaxial or twisted pair cable.
C) Most U.S. homes have fiber connections.
D) Long-haul fiber optic networks are typically owned by firms referred to as Tier I ISPs.
Question
When talking about the physical elements of the Internet, the term redundancy refers to:

A) transmitting multiple copies of a single packet to safeguard against data loss.
B) the use of tiered high-speed switching computers to connect the backbone to regional and local networks.
C) delays in messages caused by the uneven flow of information through the network.
D) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.
Question
Identify and describe the two types of ISP service, along with the Internet connection methods, in use today.
Question
Tier 1 ISPs provide Internet access to consumers and businesses.
Question
Which of the following is not true about the mobile platform?

A) Most smartphones use Intel chips.
B) Smartphones and tablet computers are the primary means to access the Internet, both in the United States and worldwide.
C) Most smartphones use either Google's Android or Apple's iOS operating systems.
D) Smartphones use flash memory chips.
Question
T1 and T3 refer to international telephone standards for digital communication.
Question
Which of the following IEEE standards provide for high-speed short-range Wi-Fi?

A) 802.11ad
B) 802.11ay
C) 802.11ah
D) 802.11af
Question
The ________ helps define the overall structure of the Internet.

A) IAB
B) IESG
C) W3C
D) ITU
Question
In the United States, about ________ of Internet traffic now occurs over Internet Protocol version 6 (IPv6).

A) 10%
B) 15%
C) 25%
D) 50%
Question
What type of Internet access technology are Google and Facebook hoping to use to provide Internet access to remote parts of the world?

A) Bluetooth
B) drones
C) WLANs
D) EDI
Question
Which of the following organizations involved with Internet governance has the United States recently given up control over?

A) ICANN
B) IGF
C) NTIA
D) IANA
Question
All of the following either currently, or have plans to, offer Internet access via satellite except:

A) Facebook
B) Dish
C) Microsoft
D) Boeing
Question
You are browsing the Web on your tablet computer. Describe the web page data path from its origination point on a distant computer to your tablet.
Question
The major hubs in the United States where the Internet backbone intersects with regional and local networks are now commonly referred to as Internet Exchange Points (IXPs).
Question
The backbone of the Internet is formed by:

A) Internet Exchange Points (IXPs).
B) Tier 1 ISPs.
C) Network Access Points (NAPs).
D) Metropolitan Area Exchanges (MAEs).
Question
The concept behind document formatting had its roots in which of the following?

A) XML
B) SGML
C) HTML
D) GML
Question
Briefly describe the development of the Web including the key players.
Question
A(n) ________ allows users to easily add and edit content on a web page.

A) wiki
B) podcast
C) blog
D) RSS feed
Question
HTML defines the structure of a web page.
Question
WLAN-based Internet access derives from the same technological foundations as telephone-based wireless Internet access.
Question
Explain how the Internet and the Web make e-commerce possible. Briefly discuss at least four features or services that support e-commerce.
Question
Why is VoIP considered to be a disruptive technology?
Question
The Internet of Things (IoT) is based on sensors that can collect data and connect to the Internet.
Question
The United States has the world's highest average Internet connection speed.
Question
Which of the following was the most popular web browser as of August 2018?

A) Internet Explorer
B) Safari
C) Chrome
D) Firefox
Question
Which of the following enables Internet users to communicate with each other, although not in real time?

A) mobile messaging
B) online forum
C) SMS messaging
D) VoIP
Question
Cortana is a type of:

A) intelligent digital assistant.
B) widget.
C) gadget.
D) social network.
Question
What are some of the issues related to the Internet of Things (IoT)?
Question
You could expect to find all of the following services in a web server software package except:

A) security services.
B) FTP.
C) search engine.
D) an RSS aggregator.
Question
In the address http://www.company.com/clients.html, which of the following is the top-level domain?

A) )com
B) company.com
C) www
D) http
Question
The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called:

A) VoIP.
B) IPTP.
C) VTP.
D) IP.
Question
The first web browser to make it possible to view documents on the Web with colored background, images, and animations was:

A) Netscape Navigator.
B) Mosaic.
C) Mozilla.
D) Internet Explorer.
Question
Which of the following is not a mobile messaging application?

A) Kik
B) WhatsApp
C) Viber
D) Feedly
Question
Microsoft's pilot program to provide broadband Internet access to rural areas uses which of the following technologies?

A) satellites
B) drones
C) unused, low-powered television channels
D) high altitude balloons
Question
All of the following statements about HTML5 are true except:

A) HTML5 has become the de facto web page development standard.
B) HTML5 is an important tool for both response web design and adaptive web delivery.
C) HTML5 apps work just like web pages.
D) HTML5 stores page content into mobile device hardware rather loading into the browser from a web server.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/84
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: E-Commerce Infrastructure
1
Where does TLS operate within TCP/IP?

A) between the Internet Layer and the Transport Layer
B) between the Transport Layer and the Application Layer
C) between the Network Interface Layer and the Transport Layer
D) between the Internet Layer and the Application Layer
B
2
Which of the following occurred during the Commercialization phase of Internet development?

A) The fundamental building blocks of the Internet were realized in actual hardware and software.
B) Personal computers were invented.
C) The Domain Name System was introduced.
D) NSF privatized the operation of the Internet's backbone.
D
3
During which period of time did the Institutionalization phase of Internet development take place?

A) 1950-1960
B) 1961-1974
C) 1975-1995
D) 1995-through the present
C
4
Which of the following protocols is used to send mail to a server?

A) SMTP
B) FTP
C) HTTP
D) SSL
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
5
________ is a utility program that allows you to check the connection between your client and a TCP/IP network.

A) Ping
B) Telnet
C) Tracert
D) Finger
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
6
The Transport Layer of TCP/IP is responsible for which of the following?

A) placing packets on and receiving them from the network medium
B) addressing, packaging, and routing messages
C) providing communication with the application by acknowledging and sequencing the packets to and from the application
D) providing a variety of applications with the ability to access the services of the lower layers
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
7
The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:

A) routing.
B) the Transmission Control Protocol.
C) packet switching.
D) the File Transfer Protocol.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is the core communications protocol for the Internet?

A) Telnet
B) FTP
C) TCP/IP
D) TLS
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
9
The address used by a browser to identify the location of content on the Web is called:

A) a domain name.
B) a uniform resource locator.
C) an IP address.
D) a file path.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
10
________ is used to allow remote login on another computer.

A) Telnet
B) FTP
C) HTTP
D) SSL
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following statements about cloud computing is not true?

A) A public cloud is typically used by companies with stringent privacy and security requirements.
B) Dropbox is an example of a public cloud.
C) Hybrid clouds offer both public and private cloud options.
D) A private cloud may be hosted internally or externally.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture?

A) fiber optics
B) Wi-Fi
C) IPv6
D) client/server computing
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is not one of the basic technological foundations of the Internet?

A) client/server computing
B) FTP
C) TCP/IP
D) packet switching
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
14
________ is a model of computing in computer processing, storage, software, and other services which are provided as a shared pool of virtualized resources over the Internet.

A) Client/server computing
B) P2P computing
C) Mobile computing
D) Cloud computing
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following are specialized computers that transmit message parcels along available Internet communication paths and on to their destinations?

A) routers
B) Web servers
C) IP servers
D) packet servers
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
16
The Internet Layer of TCP/IP is responsible for which of the following?

A) placing packets on and receiving them from the network medium
B) addressing, packaging, and routing messages
C) providing communication with the application by acknowledging and sequencing the packets to and from the application
D) providing a variety of applications with the ability to access the services of the lower layers
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
17
During which phase of the development of the Internet was the Domain Name System (DNS) introduced?

A) commercialization phase
B) institutional phase
C) innovation phase
D) consolidation phase
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
18
An IPv4 address is expressed as a:

A) 32-bit number that appears as a series of four separate numbers separated by semicolons.
B) 64-bit number that appears as a series of four separate numbers separated by semicolons.
C) 64-bit number that appears as a series of four separate numbers separated by periods.
D) 32-bit number that appears as a series of four separate numbers separated by periods.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is not an advantage of client/server computing over centralized mainframe computing?

A) It is easy to expand capacity by adding servers and clients.
B) Each client added to the network increases the network's overall capacity and transmission speeds.
C) Client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer.
D) There is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
20
The ________ allows a natural language expression, such as Google.com to represent a numeric IP address.

A) uniform resource locator system
B) Internet protocol addressing schema
C) domain name system
D) assigned numbers and names (ANN) system
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
21
The Web runs in which layer of Internet architecture?

A) Network Technology Substrate layer
B) Middleware Services layer
C) Transport Services and Representation Standards layer
D) Applications layer
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
22
The term latency refers to a delay that can be experienced in packet-switched networks.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following protocols enables the exchange of routing information among different autonomous systems on the Internet?

A) HTTP
B) BGP
C) FTP
D) SMTP
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
24
HTTP/2 is supported by almost all the leading web browsers.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
25
Amazon Web Services is an example of a private cloud.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following is a utility program that allows you to track the path of a message sent from a client computer to a remote computer on the Internet?

A) Telnet
B) Ping
C) IMAP
D) Tracert
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
27
The layer of Internet architecture that ties the applications to the communications network and includes security and authentication services is called the:

A) Network Technology Substrate layer.
B) Middleware Services layer.
C) Transport Services and Representation Standards layer.
D) Applications layer.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following was the original purpose of the Internet?

A) to provide a network that would allow businesses to connect with consumers
B) to link large mainframe computers on different college campuses
C) to develop a military communications system that could withstand nuclear war
D) to enable government agencies to track civilian communications
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
29
What are the essential characteristics of cloud computing?
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
30
IMAP is the Internet protocol used by a browser to transfer web pages.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
31
FTP is the protocol that permits users to transfer files from a server to their client computer, and vice versa.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
32
What are the implications of cloud computing for e-commerce?
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
33
TCP/IP operates in which layer of Internet architecture?

A) Network Technology Substrate layer
B) Middleware Services layer
C) Transport Services and Representation Standards layer
D) Applications layer
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following organizations monitor Internet policies and practices?

A) IETF
B) ISOC
C) W3C
D) ICANN
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
35
Explain each of the three important concepts behind the Federal Networking Council's definition of the term Internet. Explain how each technology contributes to the functioning of the Internet today.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is a set of rules for transferring data?

A) protocol
B) packet
C) router
D) IP address
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
37
In a hybrid cloud computing model, firms use their own infrastructure for their most essential core activities.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following is not a basic type of cloud computing service?

A) IaaS
B) PaaS
C) SaaS
D) FiOS
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following are central directories that list all domain names currently in use for specific domains?

A) Web servers
B) root servers
C) client servers
D) DNS servers
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
40
A private cloud is operated for the benefit of multiple firms.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following is not a concern about IoT?

A) the falling cost of sensors
B) interoperability
C) security
D) privacy
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
42
Bluetooth is a high-speed, fixed broadband wireless local area network for commercial and residential use.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
43
The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices.

A) Internet Engineering Steering Group (IESG)
B) World Wide Web Consortium (W3C)
C) Internet Engineering Task Force (IETF)
D) Internet Society (ISOC)
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
44
All of the following are involved in the effort to create standards for IoT except:

A) AllSeen Alliance.
B) Industrial Internet Consortium.
C) Open Connectivity Foundation.
D) W3C.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
45
The major technologies used with wireless local area networks are:

A) Wi-Fi and Bluetooth.
B) Wi-Fi and WiMax.
C) Bluetooth and 3G.
D) WiMax and 3G.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following statements about fiber-optic cable is not true?

A) It transmits more data at faster speeds than coaxial or twisted pair cable.
B) It is thinner and lighter than coaxial or twisted pair cable.
C) Most U.S. homes have fiber connections.
D) Long-haul fiber optic networks are typically owned by firms referred to as Tier I ISPs.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
47
When talking about the physical elements of the Internet, the term redundancy refers to:

A) transmitting multiple copies of a single packet to safeguard against data loss.
B) the use of tiered high-speed switching computers to connect the backbone to regional and local networks.
C) delays in messages caused by the uneven flow of information through the network.
D) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
48
Identify and describe the two types of ISP service, along with the Internet connection methods, in use today.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
49
Tier 1 ISPs provide Internet access to consumers and businesses.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
50
Which of the following is not true about the mobile platform?

A) Most smartphones use Intel chips.
B) Smartphones and tablet computers are the primary means to access the Internet, both in the United States and worldwide.
C) Most smartphones use either Google's Android or Apple's iOS operating systems.
D) Smartphones use flash memory chips.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
51
T1 and T3 refer to international telephone standards for digital communication.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following IEEE standards provide for high-speed short-range Wi-Fi?

A) 802.11ad
B) 802.11ay
C) 802.11ah
D) 802.11af
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
53
The ________ helps define the overall structure of the Internet.

A) IAB
B) IESG
C) W3C
D) ITU
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
54
In the United States, about ________ of Internet traffic now occurs over Internet Protocol version 6 (IPv6).

A) 10%
B) 15%
C) 25%
D) 50%
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
55
What type of Internet access technology are Google and Facebook hoping to use to provide Internet access to remote parts of the world?

A) Bluetooth
B) drones
C) WLANs
D) EDI
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following organizations involved with Internet governance has the United States recently given up control over?

A) ICANN
B) IGF
C) NTIA
D) IANA
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
57
All of the following either currently, or have plans to, offer Internet access via satellite except:

A) Facebook
B) Dish
C) Microsoft
D) Boeing
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
58
You are browsing the Web on your tablet computer. Describe the web page data path from its origination point on a distant computer to your tablet.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
59
The major hubs in the United States where the Internet backbone intersects with regional and local networks are now commonly referred to as Internet Exchange Points (IXPs).
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
60
The backbone of the Internet is formed by:

A) Internet Exchange Points (IXPs).
B) Tier 1 ISPs.
C) Network Access Points (NAPs).
D) Metropolitan Area Exchanges (MAEs).
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
61
The concept behind document formatting had its roots in which of the following?

A) XML
B) SGML
C) HTML
D) GML
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
62
Briefly describe the development of the Web including the key players.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
63
A(n) ________ allows users to easily add and edit content on a web page.

A) wiki
B) podcast
C) blog
D) RSS feed
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
64
HTML defines the structure of a web page.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
65
WLAN-based Internet access derives from the same technological foundations as telephone-based wireless Internet access.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
66
Explain how the Internet and the Web make e-commerce possible. Briefly discuss at least four features or services that support e-commerce.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
67
Why is VoIP considered to be a disruptive technology?
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
68
The Internet of Things (IoT) is based on sensors that can collect data and connect to the Internet.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
69
The United States has the world's highest average Internet connection speed.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
70
Which of the following was the most popular web browser as of August 2018?

A) Internet Explorer
B) Safari
C) Chrome
D) Firefox
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
71
Which of the following enables Internet users to communicate with each other, although not in real time?

A) mobile messaging
B) online forum
C) SMS messaging
D) VoIP
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
72
Cortana is a type of:

A) intelligent digital assistant.
B) widget.
C) gadget.
D) social network.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
73
What are some of the issues related to the Internet of Things (IoT)?
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
74
You could expect to find all of the following services in a web server software package except:

A) security services.
B) FTP.
C) search engine.
D) an RSS aggregator.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
75
In the address http://www.company.com/clients.html, which of the following is the top-level domain?

A) )com
B) company.com
C) www
D) http
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
76
The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called:

A) VoIP.
B) IPTP.
C) VTP.
D) IP.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
77
The first web browser to make it possible to view documents on the Web with colored background, images, and animations was:

A) Netscape Navigator.
B) Mosaic.
C) Mozilla.
D) Internet Explorer.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
78
Which of the following is not a mobile messaging application?

A) Kik
B) WhatsApp
C) Viber
D) Feedly
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
79
Microsoft's pilot program to provide broadband Internet access to rural areas uses which of the following technologies?

A) satellites
B) drones
C) unused, low-powered television channels
D) high altitude balloons
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
80
All of the following statements about HTML5 are true except:

A) HTML5 has become the de facto web page development standard.
B) HTML5 is an important tool for both response web design and adaptive web delivery.
C) HTML5 apps work just like web pages.
D) HTML5 stores page content into mobile device hardware rather loading into the browser from a web server.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 84 flashcards in this deck.