Deck 7: How the Internet Works
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/58
Play
Full screen (f)
Deck 7: How the Internet Works
1
Layered protocol schemes are also referred to as protocol architectures.
True
2
A program implementing a Layer-2 protocol will package each of your frames into packets.
False
3
To send a segment to RH,the IP layer program on your computer first packages each segment into a packet.
True
4
The Internet Engineering Task Force developed a five layer protocol architecture known as TCP/IP-OSI.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
5
Not every layer has a protocol associated with it.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
6
Reliability is provided by the TCP protocol.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
7
File Transfer Protocol is an application-layer protocol.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
8
A protocol is a standardized means for coordinating an activity between two or more entities.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
9
In most cases,when you plug your computer into a network,a program in the operating system will search that network for a DHCP server.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
10
The data link layer governs the transmission of frames.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
11
The TCP program breaks messages down into packets.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
12
The physical layer governs transmission standards between adjacent devices connected by a transmission medium.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
13
SMTP and HTTP are examples of Layer-2 protocols.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
14
The Internet has adopted the TCP/IP-OSI architecture.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
15
The ISO developed TCP/IP layered protocol.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
16
The Internet layer deals with end-to-end communications between two hosts.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
17
Every NIC is given a MAC address at the factory.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
18
A program is a specific computer product that implements a protocol.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
19
IP addresses are also called physical addresses.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
20
IP addresses are not permanently associated with a given hardware device.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
21
MAC address are used on the Internet.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
22
The DNS converts IP addresses into user-friendly domain names.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following is true of IP addresses?
A)They are written as a series of continuous integers.
B)IP addresses are not permanently associated with a given hardware device.
C)They cannot be reassigned to another computer,router,or other device.
D)IP addresses are based on the MAC address of the NIC device on the server.
A)They are written as a series of continuous integers.
B)IP addresses are not permanently associated with a given hardware device.
C)They cannot be reassigned to another computer,router,or other device.
D)IP addresses are based on the MAC address of the NIC device on the server.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
24
The Internet is based on a packet-switching protocol called ________.
A)TCP/IP
B)FTP
C)SMTP
D)NAT
A)TCP/IP
B)FTP
C)SMTP
D)NAT
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
25
In the various layers of a network architecture,a ________ is a set of rules that accomplish the tasks assigned to that layer.
A)protocol
B)privilege
C)logic
D)permission
A)protocol
B)privilege
C)logic
D)permission
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
26
Each NIC's MAC address is also called its ________.
A)URL
B)physical address
C)serial number
D)identifier
A)URL
B)physical address
C)serial number
D)identifier
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
27
IPTV is the protocol used to transmit television and other video signals over the Internet.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
28
To transfer files between two computers you would use the ________ protocol.
A)OSI
B)SMTP
C)HTTP
D)FTP
A)OSI
B)SMTP
C)HTTP
D)FTP
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
29
IP addresses are also called ________ addresses.
A)logical
B)physical
C)MAC
D)network
A)logical
B)physical
C)MAC
D)network
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
30
_____ licenses other agencies to register unique domain names and their associated IP addresses.
A)DNS
B)IETF
C)DSL
D)ICANN
A)DNS
B)IETF
C)DSL
D)ICANN
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
31
Information sent over the Internet is broken down into pieces,called ________.
A)packets
B)chunks
C)bits
D)bytes
A)packets
B)chunks
C)bits
D)bytes
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
32
A service that provides temporary private IP addresses to computer users is called ________.
A)DNS
B)DHCP
C)TCP/IP
D)HTTP
A)DNS
B)DHCP
C)TCP/IP
D)HTTP
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
33
________ is a standard email protocol.
A)TCP/IP
B)FTP
C)SMTP
D)HTTP
A)TCP/IP
B)FTP
C)SMTP
D)HTTP
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
34
The process of changing public IP addresses into private IP addresses is called Network Address Translation.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
35
The ________ protocol is used for the processing of Web pages.
A)TCP/IP
B)FTP
C)HTTP
D)OSI
A)TCP/IP
B)FTP
C)HTTP
D)OSI
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
36
In a private network,administrators cannot manually assign IP addresses.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
37
Switches employ a table to tell it where to direct traffic.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
38
Universal resource allocation is the process of converting a domain name into a public IP address.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
39
A(n)________ program examines your email and attachments and breaks a lengthy message into pieces called ________.
A)TCP;segments
B)FTP;packets
C)SMTP;chunks
D)OSI;bytes
A)TCP;segments
B)FTP;packets
C)SMTP;chunks
D)OSI;bytes
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
40
A program implementing a Layer-2 protocol will package each of your packets into ________.
A)segments
B)packets
C)frames
D)bytes
A)segments
B)packets
C)frames
D)bytes
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
41
Public IP addresses are converted to private ones and vice versa using ________.
A)PSDN
B)ATM
C)MAC
D)NAT
A)PSDN
B)ATM
C)MAC
D)NAT
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
42
What are the main Layer-5 protocols?
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
43
What is role of DHCP?
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
44
________ administers domain name registration.
A)ICANN
B)TLD
C)URL
D)DNR
A)ICANN
B)TLD
C)URL
D)DNR
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
45
To send television transmissions over the Internet you would use ________.
A)SMTP
B)FTP
C)VoIP
D)IPTV
A)SMTP
B)FTP
C)VoIP
D)IPTV
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
46
________ is the process of converting a domain name into a public IP address.
A)Domain name resolution
B)Universal resource location
C)Hypertexting
D)Metatagging
A)Domain name resolution
B)Universal resource location
C)Hypertexting
D)Metatagging
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
47
To send voice transmissions over the Internet you would use ________.
A)SMTP
B)FTP
C)VoIP
D)IPTV
A)SMTP
B)FTP
C)VoIP
D)IPTV
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
48
Briefly explain the data transmission protocol at the TCP/IP-OSI Layer-3.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
49
Routers provide the service of ________.
A)programming support
B)query support
C)traffic maintenance
D)URL registration
A)programming support
B)query support
C)traffic maintenance
D)URL registration
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
50
Switches work with ________ at Layer 2.
A)frames
B)packets
C)segments
D)MAC addresses
A)frames
B)packets
C)segments
D)MAC addresses
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
51
208.77.188.103 is an example of a(n)________.
A)domain name
B)IP address
C)MAC address
D)DNS
A)domain name
B)IP address
C)MAC address
D)DNS
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
52
ICANN manages thirteen ________ that maintain a list of IP addresses of servers that resolve each type of TLD.
A)root servers
B)DNS servers
C)URL servers
D)cache servers
A)root servers
B)DNS servers
C)URL servers
D)cache servers
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
53
Explain domain name resolution.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
54
What are the two kinds of IP addresses?
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
55
The last letters in any domain name are referred to as the ________.
A)DNS name
B)Web address
C)URL
D)top-level domain
A)DNS name
B)Web address
C)URL
D)top-level domain
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
56
A ________ resolves domain names into IP addresses.
A)DNS
B)DHCP
C)TCP/IP
D)LAN IP
A)DNS
B)DHCP
C)TCP/IP
D)LAN IP
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
57
The process of changing a name into its IP address is called ________.
A)address verification
B)URL submission
C)resolving the domain name
D)unique identification
A)address verification
B)URL submission
C)resolving the domain name
D)unique identification
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
58
A document's address on the Web is its ________.
A)DNS
B)TLD
C)URL
D)DNR
A)DNS
B)TLD
C)URL
D)DNR
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck