51 questions
Which of the following is NOT a benefit of cloud computing?
Data can be backed up offsite to protect against local emergencies or disasters.
Users can access data from any remote location or setting that has online access.
Multiple users can collaboratively interact with shared data.
Cloud data cannot be subpoenaed by law enforcement.
Which of the following is a direct consequence of the “digital divide”?
Internet service providers throttle available bandwidth to customers based upon the type of data being transferred.
Members of poorer or more remote communities are excluded from the benefits of essential online services and resources.
Online services collect and sell personal information about customers based upon usage patterns.
Internet users are able to ensure secure communication channels through the use of strong encryption.
Which of the following best describes the client-server model of online computing systems?
Using a client application, like a web browser, a user transmits requests over the internet to a remote server that responds with the requested web page or other digital resource, which is transmitted back to the original user.
Individual users, known as clients, purchase online connectivity from internet service providers, known as servers.
A web site uses a variety of client applications to automatically generate dynamic web content that individual users serve to each other.
The internet consists of a network of interconnected nodes, known as client-server devices, that route communications back and forth between one client-server and its nearest neighbor.
Which of the following best describes the function of the domain name system (DNS)?
DNS is a service that individuals or corporations can use to purchase and register ownership of domain names.
The domain name system is a non-profit organization that regulates the introduction and assignment of new, top-level domains (TLD).
DNS provides a directory service that associates a domain name with the IP addresses of the server hosting the domain.
DNS determines the most efficient route through a network that a document should follow as it is transmitted from one node to the next.
Which of the following is a reason for systems to adopt a new internet protocol standard (IPv6) instead of the original standard (IPv4)?
IPv6 allows data to be transferred at much higher speeds than with IPv4.
IPv6 allows a much larger range of addresses than IPv4.
IPv6 enables encrypted communication, whereas IPv4 does not.
IPv6 offers lossless compression of data, whereas IPv4 uses lossy compression Algorithms.
When Tim Berners-Lee developed the first specifications, protocols, and tools for the World Wide Web in 1993, his employers at CERN chose to make the underlying code publicly available on a royalty-free basis so that anyone who ever wanted to use it or build upon it could do so without having to pay any licensing fees to CERN or ask for CERN’s permission.
Which of the following best describes the reasons for this decision?
CERN did not recognize the full potential of the World Wide Web and did not think it was worth investing any more of its own resources into its further development.
By offering the Word Wide Web as a freely available alternative, CERN hoped to discourage people from using America Online, CERN’s biggest competitor for online communication services.
Had the technology been proprietary (i.e., closed and privately licensed), it would likely not have become as popular as it has or have been adopted by so many users and institutions across the globe.
Because Tim Berners-Lee did not ask his employers for permission before using CERN resources to develop the World Wide Web, as punishment, he was required to give the technology away for free and sacrifice the millions of dollars he could have personally made by selling his idea for a profit.
A pair of young entrepreneurs has decided to use an online crowdfunding website to launch a campaign designed to raise funds for a programmable kitchen appliance that they envision designing, selling and building a business around.
Which of the following technological advances has NOT contributed toward making this new form of fundraising possible?
GPS (Global Positioning System)
Encryption
World Wide Web
Online banking and e-commerce
Which of the following is an example of a service that utilizes an asymmetric, “publisher-subscriber” model for distributing online communications?
Video conferencing
SMS text messaging
Online chat
Blogging
Urban planners have proposed the creation and installation of “smart intersections” that can replace existing traffic lights in congested urban areas. Rather than regulating traffic flow with alternating red (“Stop”), yellow (“Caution”), and green (“Go”) lights that human drivers obey, a centralized “intersection controller” device would wirelessly communicate directly with the onboard computers in autonomous vehicles to coordinate how and when it is safe for them to proceed through the intersection.
In such a scenario, a car approaching an intersection would wirelessly signal the intersection’s controller unit with its current speed and distance to request permission to enter the intersection. The controller would then dynamically calculate the ideal “entry” and “exit” times for when the car can safely proceed through the intersection without colliding with any other vehicles that might also be passing through the intersection from other directions at the same moment. As it calculates the trajectories for all approaching vehicles, the controller would relay instructions to each car, which would then adjust its own speed so that it arrives at the intersection at the right time and speed to pass through the intersection untouched. For non-autonomous vehicles, a secondary visual signaling device (something similar to existing traffic lights) would need to be devised that would allow any human drivers to interact safely with the computer-controlled vehicles passing through the intersection.
Researchers have shown through computer simulations and modeling that such “smart intersections” would be capable of simultaneously coordinating the actions of up to two dozen cars all approaching the same intersection from four different directions safely without collisions or delays. Their studies have shown that in cases with as few as half of all cars having the necessary autonomous driving technology to work with such systems, they could relieve traffic congestion at busy intersections by almost 50% and reduce the time that drivers currently sit at red lights by more than 65%.
Despite these promising results, much work needs to be done before these “smart intersections” can be deployed throughout cities. Which of the following is NOT a step that lawmakers would need to resolve in order to make “smart intersections” a reality?
New traffic laws would need to be written for existing intersections that specify how autonomous vehicles should handle the standard red-yellow- green traffic signals of standard intersections.
New traffic laws would need to be written for “smart intersections” that specify how human drivers (i.e., those operating vehicles that are NOT fully autonomous) should handle the secondary visual signals of computer-controlled “smart intersections.”
Liability would need to be determined in the event of accidents caused by faulty intersection controllers and/or autonomous vehicles.
Regulations must be passed that specify the minimum hardware and software requirements of fully autonomous vehicles so that they are compatible with the “smart intersections.”
Which of the following best describes the controversies surrounding the ethics of pre-programmed decision-making with regards to self-driving cars and other autonomous technologies?
I only
I and II
II and III
I, II and III
Which of the following is the most important factor when using e-commerce services?
Purchasing only the items you need
Verifying that the website provides secure transactions
Ensuring reliable internet access
Using only e-commerce services that you have used before
According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?
about.example.com
example.co.uk
www.example.com
example.org
What type of communication takes place between two individuals or parties and the use of encryption so that only the desired individuals have access to what is being said or heard?
Public
Private
Symmetric
Asymmetric
An open platform enables third parties to add functionality to already existing technologies by using existing standards. Which of the following does not describe the idea of an open platform?
Hardware used for USB ports are common so that they accept different brands of flash drives regardless of the computer being used.
Twitter allows other programs like Hootsuite and TweetDeck to send data back and forth between the program and Twitter’s databases.
Google helps to develop a version of Android, but the OEMs have to work in order to fine tune it to fit their own devices and their own needs.
Apple’s iOS allows you to download several applications from only the Apple App Store unless you “jailbreak” your device.
Online search engines like Google, Bing and DuckDuckGo help to make information readily available to us when we need it. However, what do Wikis do that these search engines do not that also makes them useful in their own sense?
They prioritize results based on the relative connectedness of web pages.
They catalog results so you know exactly where to find the source of the information.
They help consolidate and organize information into a nice online reference.
They can index results so that you can sort through them to get to a desired result.
What is not a benefit of cloud computing?
The freedom of cloud computing allows you to access data from any device that has a connection to the internet – anytime and anywhere.
Security and data breaches are uncommon when using cloud computing, so there is no reason to worry about the wrong person accessing your data.
Storage capacity of the cloud you are using can be expanded to as large as you need simply by buying more storage.
More collaboration can occur because files can be easily shared and accessed by multiple people all around the world.
Some countries lack physical resources, like computers or network connections, making it difficult to keep up with the technology of the world. These same countries or locations lack the digital skills and literacy, being comfortable with technology and understanding how to effectively use it, needed in order to be successful in this connected world. The situation described above is commonly referred to as what?
The device debacle
The technology rut
The digital divide
The great internet shortage
IP addresses express a node’s relative location in a network and are normally represented by a 32-bit number. The numbers are presented in 4 sets of values from 0 – 255 to make them more readable (i.e. Google is represented by 74.125.224.72). Currently, most of the world is using IPv4 addresses as the standard, but in some areas, addressing is now being done according to IPv6 standards. How many bits are used for these new IP addresses?
64
96
128
256
What is the primary transport protocol used by the World Wide Web for delivering web
content?
HTTP
TCP
IP
ISP
What best describes how a web browser and a web server interact with each other?
A web server is a vast network of interconnected computers that store information. When a client uses a web browser, the information found on the internet can be found and displayed.
A web browser is a client application that is run on a user’s computer that requests information from the web server that hosts all the files you are requesting.
A web server is a program that a user can use to access information from a web browser, which in turn will display the content .
A web browser is used by a client to request information on the internet. The web server is another client that is requesting the same information. Together, both the web server and web browser simultaneously view the content.
The IETF (Internet Engineering Task Force) is responsible for developing and overseeing internet standards. Which of the following is not a common protocol maintained by the IETF?
HTTP
IP
GPS
SMTP
YouTube is a video sharing website which allows users to upload videos to share and / or watch videos uploaded by other users. This type of service has had both negative and beneficial effects on education. Which of the following is a negative effect that YouTube and sites like YouTube have had on education?
Students can watch clips of their favorite video games during class, enabling them to never miss an upload.
Teachers can upload videos of their lectures so that absent students can watch them at home to get caught back up with the class.
Morning announcements can be streamed on YouTube, making it easier for the whole student body to watch.
The human resources director can create promotional videos and easily share them with parents and the community.
What must devices that communicate with one another on the internet have in common?
Be the same brand.
Be in the same physical location.
Use the same internet protocols.
Use the same internet service provider.
Website IP addresses such as 74.125.65.91 and 72.21.211.176 are difficult to remember instead we enter www.youtube.com and www.amazon.com. What internet protocol allows us to do type the names instead of the numbers of these addresses?
HTTP
URL
IP
DNS
Students recently created a Gaming Club at their school. On Friday of every week, students bring in their gaming consoles (Xbox, Playstation, etc) and they play their favorite games with other users online. The only problem seems to be that there is a lot more lag (delay in the actions of the controller and in game actions) then when playing at home. What might NOT be the issue students are having in their Gaming Club?
The bandwidth of the school’s internet connection is lower than at home.
There is a longer latency in the internet communications than students are use to at their home.
The gaming consoles RAM is not high enough at school.
There are too many devices connected to the same internet connection.
What is true about Public Key Encryption?
Only one key is used for both encryption and decryption and it is made available to the public.
Two keys are used, one is public and another is private to only the owner of the data.
Only one key is used, and it needs to be requested from the owner of the data in order to access it.
Two keys are used, both are public but one provide more information about the data than the other.
Which of the following is NOT a valid IP address that is consistent with the IPv4 standards?
8.8.8.8
12.144.65.88
10.10.129.242
4.15.207.256
Packet switching is the method by which information is transmitted through routers on the internet. Below is an example of a series of routers for which the packets can be sent. If packets have an origination of “A” and a destination of “H,” which is NOT a path that a packet might take?
A to B to F to G to H
A to B to E to H
A to C to B to D to F to G to E to H
A to F to G to H
The end-to-end architecture helps facilitate the connection of new devices and networks to the internet. Following this same end-to-end principle, what protocol helps to facilitate the accuracy and completeness of the transmission of data in the internet?
IP
TCP
UDP
HTTP
What does it mean for the routing of the Internet to be fault tolerant and redundant?
If one path for data transmission is blocked or corrupted, data can follow another path.
If the Internet goes down, packets of information will still be sent while “offline.”
There are no issues with routing information on the internet because protocols and high standards have made for faultless routing.
There is only one path for data to travel from one device to another device on the Internet.
The “Internet of Things” is the interconnection, via the Internet, of everyday objects made possible by computing devices embedded in those objects that send or receive data. Because of the rapidly growing number of devices connecting to the Internet, what protocol was developed to help manage and assign unique IP addresses to these devices?
IPv8
TCP
HTTP
IPv6
According to the domain name system (DNS), which of the following is not part of the same top-level domain?
www.english.org
www.games.math.org
www.games.english.com
games.english.org
I am creating a new social media application that allows users to only communicate using emojis - no text, picture, video or audio. What type of communication structure would there be if all a person needed to do to see an emoji conversation was to “subscribe” to their account?
Public
Private
Symmetric
Asymmetric
What is a computer or a software application that requests service from a server on the Internet?
LAN
ISP
Host
Client
The Internet is a network of networks in which host computers are connected by what?
Routers
Clients
Servers
Packets
What is the 4th level domain of the following domain name: http://www.csp.uteach.org/unit1/project/rubric ?
uteach
www
org
unit1
Which of the following is NOT a true statement about devices and the Internet?
The internet assigns an IP address to any device when it connects to the internet.
The Internet connects devices and networks all around the world to help facilitate communication.
The devices that use the Internet must abide by protocols in order to properly communicate.
Devices are limited to communicating over the Internet with only other devices within the same local area.
Platforms like Facebook and Hi5, two social media sites, allow many users to use them for no cost to them. However, users do not have access to the data and information stored on their databases. This is an example of what kind of platform?
Clear
Open
Shut
Closed
A computer science student often uses public forum sites like CodeGuru, DreamInCode and StackOverflow in order to help with learning a new programming language. Which of the following is true about these kinds of learning forums?
Forums hinder communication because moderators of the forum delete vulgar and irrelevant posts.
Students should not be using these kinds of sites and should only rely on teachers to get help.
Public data found on these forums provides widespread access to identified problems and their solutions.
Data from these sites are completely copyright free and answers, ideas and concepts can be used at the will of any user.
The Internet has brought forth widespread access to information all around the world. Which of the following has been made easier because of this access?
Finding a job
Banking
Shopping
All of the above
What is true about social media sites and how they are used around the world?
Youth share text and images expressing their feelings.
Middle aged people try to reconnect and find old friends from high school.
Older people look at photos of their children and grandchildren in a way to try to stay connected with them.
All of the above.
What best describes the Internet?
A network of interconnected devices that helps to facilitate communication and provide information using an agreed upon set of protocols.
A global network of interconnected devices that helps to facilitate communication and provide information using an agreed upon set of protocols.
A global network of interconnected devices that helps to facilitate communication using an agreed upon set of protocols.
A global network of stand-alone devices that helps to facilitate communication and provide information using an agreed upon set of protocols.
Just like smart cars, there are also smart buildings. What is NOT an example of smart buildings?
An office building uses a fingerprint scanner in order to allow only its employees to enter the building.
A pet store uses automatic fish feeders that attach to each fishes tank. The fish are then fed a certain amount of food twice a day, everyday.
A school uses motion sensors in order to monitor which rooms are currently in use and automatically turn off the lights after a set amount of time.
A large factory uses a heating / cooling system that automatically senses which areas are not at the right temperature and redirects the warm / cool air to that location.
A packet is a collection of data used by the TCP/IP protocol to transmit data across the internet. What does each package contain?
Select two answers.
Control information for routing the data
The entire message
A small portion of the message
Return information in case the packet does not make it to the destination
What is true about DNS?
Select two answers.
DNS is completely secure because it utilizes SSL and TTL
DNS is not completely secure.
The hierarchy that DNS uses prevents it from scaling easily.
The hierarchy that DNS uses allows it to easily scale.
GPS has fostered many benefits in our society, but have also added some risks. What is a risk of GPS?
Select two answers.
GPS can be used by police in order to track down cars, cell phones, etc in order to locate stolen vehicles and devices.
GPS navigation systems distract drivers and sometimes cause accidents on the road.
GPS navigation systems are not always up-to-date, therefore the route from origination and destination has to change sometimes midway through the trip.
GPS is used by some backpackers in order to help them navigate the wilderness terrain.
What best explains an effect of the digital divide within our own country?
Select two answers.
Lower income families do not have access to the internet and therefore have trouble finding and applying for better jobs to help support their families.
Kids without smartphones have trouble completing their math homework for school and have to use a standard calculator.
A single father cannot afford to buy a 55” flat screen television, so the family is forced to watch television on a smaller 19” tube television.
A rural school has limited connectivity to the Internet as compared to the other schools within the local area; therefore, they are having trouble maintaining student proficiency on standardized tests.
Which of the following is an example of a sensor network and its application?
Select two answers.
Chiropractors use electric stimulation machines, which send electrical impulses from node to node on the human body in order to alleviate muscle spasms and pain.
Doctors implant automatic insulin pumps into patients with diabetes. These insulin pumps perform measurements on the blood and body in order to determine the correct dosage. Daily reports are sent to doctors and nurses emails to help monitor and calibrate the pump as needed.
Cameras with heat detection software are placed into the woods in order to monitor the risk a presence of a forest fire. Firemen and forest rangers can then alert the public as needed based on the information sent to them on their smartphones.
When a cell phone receives a phone call, text message or notification, it has the option to vibrate, ring, light-up, etc in order to alert the owner that data has been received.
Which problems could cloud computing help solve?
Select two answers.
A photographer has all of their photos stored on several different external hard drives, but is having an issue trying to store them in their small one bedroom apartment.
A group of students are trying to complete their collaborative English project, but two of their group members cannot meet over the weekend to finish it in person. Part of the requirements for the project is that all parts must be done together as a group.
A recording artist is trying to remix his favorite song, but after releasing his remix, he was contacted by the original artist because of copyright infringement.
A football fanatic is trying to stream their favorite NFL team online, but there is poor connectivity from the Internet which is causing the game to cut in and out.
An electric grid was originally developed for utilities to distribute energy to customers and them bill them once a week for their usages. However, with the ever developing energy demands of the 21st century, the smart grid introduces a two-way dialogue where electricity and information can be exchanged between the customers and utilities. It is a developing technology to help make the grid more efficient, reliable, secure and greener. What is an effect of the smart grid?
Select two answers.
After power outages, because of the complex nature of the computers and technologies involved, it will take longer to restore the electricity.
Like personal banking online, customers will be able to access their electric use online and be able to see when they use, how they use and the cost of electric and be able to adjust their usage in order to help them save money.
The cost for electric will eventually increase because of the increased need for operations and management of this new smart grid.
The addition of wind turbines and solar energy can be incorporated into the already existing grid order to help distribute more energy to those homes that need it.
Which of the following are features of the HTTPS protocol?
Select two answers.
The HTTPS protocol enables data to be edited simultaneously on multiple remote Computers (i.e. like what can be down with Google Docs).
The HTTPS protocol ensures that documents are transmitted securely using a standard encryption layer, like SSL or TLS.
The HTTPS protocol defines the standards for transmitting hypertext documents, such as those that have been formatted according to the HTML standard.
The HTTPS protocol ensures that files sizes are reduced using lossless compression algorithms (i.e. Huffman Coding).