Deck 7: How the Internet Works

Full screen (f)
exit full mode
Question
Layered protocol schemes are also referred to as protocol architectures.
Use Space or
up arrow
down arrow
to flip the card.
Question
A program implementing a Layer-2 protocol will package each of your frames into packets.
Question
To send a segment to RH,the IP layer program on your computer first packages each segment into a packet.
Question
The Internet Engineering Task Force developed a five layer protocol architecture known as TCP/IP-OSI.
Question
Not every layer has a protocol associated with it.
Question
Reliability is provided by the TCP protocol.
Question
File Transfer Protocol is an application-layer protocol.
Question
A protocol is a standardized means for coordinating an activity between two or more entities.
Question
In most cases,when you plug your computer into a network,a program in the operating system will search that network for a DHCP server.
Question
The data link layer governs the transmission of frames.
Question
The TCP program breaks messages down into packets.
Question
The physical layer governs transmission standards between adjacent devices connected by a transmission medium.
Question
SMTP and HTTP are examples of Layer-2 protocols.
Question
The Internet has adopted the TCP/IP-OSI architecture.
Question
The ISO developed TCP/IP layered protocol.
Question
The Internet layer deals with end-to-end communications between two hosts.
Question
Every NIC is given a MAC address at the factory.
Question
A program is a specific computer product that implements a protocol.
Question
IP addresses are also called physical addresses.
Question
IP addresses are not permanently associated with a given hardware device.
Question
MAC address are used on the Internet.
Question
The DNS converts IP addresses into user-friendly domain names.
Question
Which of the following is true of IP addresses?

A)They are written as a series of continuous integers.
B)IP addresses are not permanently associated with a given hardware device.
C)They cannot be reassigned to another computer,router,or other device.
D)IP addresses are based on the MAC address of the NIC device on the server.
Question
The Internet is based on a packet-switching protocol called ________.

A)TCP/IP
B)FTP
C)SMTP
D)NAT
Question
In the various layers of a network architecture,a ________ is a set of rules that accomplish the tasks assigned to that layer.

A)protocol
B)privilege
C)logic
D)permission
Question
Each NIC's MAC address is also called its ________.

A)URL
B)physical address
C)serial number
D)identifier
Question
IPTV is the protocol used to transmit television and other video signals over the Internet.
Question
To transfer files between two computers you would use the ________ protocol.

A)OSI
B)SMTP
C)HTTP
D)FTP
Question
IP addresses are also called ________ addresses.

A)logical
B)physical
C)MAC
D)network
Question
_____ licenses other agencies to register unique domain names and their associated IP addresses.

A)DNS
B)IETF
C)DSL
D)ICANN
Question
Information sent over the Internet is broken down into pieces,called ________.

A)packets
B)chunks
C)bits
D)bytes
Question
A service that provides temporary private IP addresses to computer users is called ________.

A)DNS
B)DHCP
C)TCP/IP
D)HTTP
Question
________ is a standard email protocol.

A)TCP/IP
B)FTP
C)SMTP
D)HTTP
Question
The process of changing public IP addresses into private IP addresses is called Network Address Translation.
Question
The ________ protocol is used for the processing of Web pages.

A)TCP/IP
B)FTP
C)HTTP
D)OSI
Question
In a private network,administrators cannot manually assign IP addresses.
Question
Switches employ a table to tell it where to direct traffic.
Question
Universal resource allocation is the process of converting a domain name into a public IP address.
Question
A(n)________ program examines your email and attachments and breaks a lengthy message into pieces called ________.

A)TCP;segments
B)FTP;packets
C)SMTP;chunks
D)OSI;bytes
Question
A program implementing a Layer-2 protocol will package each of your packets into ________.

A)segments
B)packets
C)frames
D)bytes
Question
Public IP addresses are converted to private ones and vice versa using ________.

A)PSDN
B)ATM
C)MAC
D)NAT
Question
What are the main Layer-5 protocols?
Question
What is role of DHCP?
Question
________ administers domain name registration.

A)ICANN
B)TLD
C)URL
D)DNR
Question
To send television transmissions over the Internet you would use ________.

A)SMTP
B)FTP
C)VoIP
D)IPTV
Question
________ is the process of converting a domain name into a public IP address.

A)Domain name resolution
B)Universal resource location
C)Hypertexting
D)Metatagging
Question
To send voice transmissions over the Internet you would use ________.

A)SMTP
B)FTP
C)VoIP
D)IPTV
Question
Briefly explain the data transmission protocol at the TCP/IP-OSI Layer-3.
Question
Routers provide the service of ________.

A)programming support
B)query support
C)traffic maintenance
D)URL registration
Question
Switches work with ________ at Layer 2.

A)frames
B)packets
C)segments
D)MAC addresses
Question
208.77.188.103 is an example of a(n)________.

A)domain name
B)IP address
C)MAC address
D)DNS
Question
ICANN manages thirteen ________ that maintain a list of IP addresses of servers that resolve each type of TLD.

A)root servers
B)DNS servers
C)URL servers
D)cache servers
Question
Explain domain name resolution.
Question
What are the two kinds of IP addresses?
Question
The last letters in any domain name are referred to as the ________.

A)DNS name
B)Web address
C)URL
D)top-level domain
Question
A ________ resolves domain names into IP addresses.

A)DNS
B)DHCP
C)TCP/IP
D)LAN IP
Question
The process of changing a name into its IP address is called ________.

A)address verification
B)URL submission
C)resolving the domain name
D)unique identification
Question
A document's address on the Web is its ________.

A)DNS
B)TLD
C)URL
D)DNR
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/58
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: How the Internet Works
1
Layered protocol schemes are also referred to as protocol architectures.
True
2
A program implementing a Layer-2 protocol will package each of your frames into packets.
False
3
To send a segment to RH,the IP layer program on your computer first packages each segment into a packet.
True
4
The Internet Engineering Task Force developed a five layer protocol architecture known as TCP/IP-OSI.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
5
Not every layer has a protocol associated with it.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
6
Reliability is provided by the TCP protocol.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
7
File Transfer Protocol is an application-layer protocol.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
8
A protocol is a standardized means for coordinating an activity between two or more entities.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
9
In most cases,when you plug your computer into a network,a program in the operating system will search that network for a DHCP server.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
10
The data link layer governs the transmission of frames.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
11
The TCP program breaks messages down into packets.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
12
The physical layer governs transmission standards between adjacent devices connected by a transmission medium.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
13
SMTP and HTTP are examples of Layer-2 protocols.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
14
The Internet has adopted the TCP/IP-OSI architecture.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
15
The ISO developed TCP/IP layered protocol.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
16
The Internet layer deals with end-to-end communications between two hosts.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
17
Every NIC is given a MAC address at the factory.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
18
A program is a specific computer product that implements a protocol.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
19
IP addresses are also called physical addresses.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
20
IP addresses are not permanently associated with a given hardware device.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
21
MAC address are used on the Internet.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
22
The DNS converts IP addresses into user-friendly domain names.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following is true of IP addresses?

A)They are written as a series of continuous integers.
B)IP addresses are not permanently associated with a given hardware device.
C)They cannot be reassigned to another computer,router,or other device.
D)IP addresses are based on the MAC address of the NIC device on the server.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
24
The Internet is based on a packet-switching protocol called ________.

A)TCP/IP
B)FTP
C)SMTP
D)NAT
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
25
In the various layers of a network architecture,a ________ is a set of rules that accomplish the tasks assigned to that layer.

A)protocol
B)privilege
C)logic
D)permission
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
26
Each NIC's MAC address is also called its ________.

A)URL
B)physical address
C)serial number
D)identifier
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
27
IPTV is the protocol used to transmit television and other video signals over the Internet.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
28
To transfer files between two computers you would use the ________ protocol.

A)OSI
B)SMTP
C)HTTP
D)FTP
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
29
IP addresses are also called ________ addresses.

A)logical
B)physical
C)MAC
D)network
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
30
_____ licenses other agencies to register unique domain names and their associated IP addresses.

A)DNS
B)IETF
C)DSL
D)ICANN
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
31
Information sent over the Internet is broken down into pieces,called ________.

A)packets
B)chunks
C)bits
D)bytes
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
32
A service that provides temporary private IP addresses to computer users is called ________.

A)DNS
B)DHCP
C)TCP/IP
D)HTTP
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
33
________ is a standard email protocol.

A)TCP/IP
B)FTP
C)SMTP
D)HTTP
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
34
The process of changing public IP addresses into private IP addresses is called Network Address Translation.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
35
The ________ protocol is used for the processing of Web pages.

A)TCP/IP
B)FTP
C)HTTP
D)OSI
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
36
In a private network,administrators cannot manually assign IP addresses.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
37
Switches employ a table to tell it where to direct traffic.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
38
Universal resource allocation is the process of converting a domain name into a public IP address.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
39
A(n)________ program examines your email and attachments and breaks a lengthy message into pieces called ________.

A)TCP;segments
B)FTP;packets
C)SMTP;chunks
D)OSI;bytes
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
40
A program implementing a Layer-2 protocol will package each of your packets into ________.

A)segments
B)packets
C)frames
D)bytes
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
41
Public IP addresses are converted to private ones and vice versa using ________.

A)PSDN
B)ATM
C)MAC
D)NAT
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
42
What are the main Layer-5 protocols?
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
43
What is role of DHCP?
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
44
________ administers domain name registration.

A)ICANN
B)TLD
C)URL
D)DNR
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
45
To send television transmissions over the Internet you would use ________.

A)SMTP
B)FTP
C)VoIP
D)IPTV
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
46
________ is the process of converting a domain name into a public IP address.

A)Domain name resolution
B)Universal resource location
C)Hypertexting
D)Metatagging
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
47
To send voice transmissions over the Internet you would use ________.

A)SMTP
B)FTP
C)VoIP
D)IPTV
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
48
Briefly explain the data transmission protocol at the TCP/IP-OSI Layer-3.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
49
Routers provide the service of ________.

A)programming support
B)query support
C)traffic maintenance
D)URL registration
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
50
Switches work with ________ at Layer 2.

A)frames
B)packets
C)segments
D)MAC addresses
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
51
208.77.188.103 is an example of a(n)________.

A)domain name
B)IP address
C)MAC address
D)DNS
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
52
ICANN manages thirteen ________ that maintain a list of IP addresses of servers that resolve each type of TLD.

A)root servers
B)DNS servers
C)URL servers
D)cache servers
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
53
Explain domain name resolution.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
54
What are the two kinds of IP addresses?
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
55
The last letters in any domain name are referred to as the ________.

A)DNS name
B)Web address
C)URL
D)top-level domain
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
56
A ________ resolves domain names into IP addresses.

A)DNS
B)DHCP
C)TCP/IP
D)LAN IP
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
57
The process of changing a name into its IP address is called ________.

A)address verification
B)URL submission
C)resolving the domain name
D)unique identification
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
58
A document's address on the Web is its ________.

A)DNS
B)TLD
C)URL
D)DNR
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 58 flashcards in this deck.