No student devices needed. Know more
17 questions
a machine that can run a program
computing device
computing system
computing network
path
a group of computers working together for a common purpose
computing device
computing system
computing network
path
a group of connected computers that can send or receive data
Computing Device
Computing System
path
computing network
a sequence of direct connections
computing device
computing system
computing network
path
Which of the following best describes the protocols used on the Internet?
The protocols of the Internet are designed by government agencies to ensure they remain free to use
The protocols of the internet are secret to maintain the privacy and security of people using them
Each device connected to the internet will use a protocol designed by the company that manufactured it
The protocols of the internet are open andused by all devices connected to the network
Jesse purchases a new smartphone and is immediately able to use it to send a photo over the Internet to a friend who lives in a different country. Which of the following is NOT necessary to make this possible?
Both devices are using the same shared and open protocols
A single direct connection is established between any two devices connected to the Internet
The data of the image is routed through a sequence of directly connected devices before arriving at its destination.
Both devices are directly connected to at least one part of the Internet
Which of the following is true of how the Internet has responded to the increasing number of devices now using the network?
The Internet protocols are changed every year to adapt to the new devices that have been connected to the network
While the number of devices connected to the Internet has grown, the network itself has not grown
The protocols of the Internet were designed to scale as new devices are added
The protocols of the Internet are no longer necessary thanks to the large number of devices now connected to the network
Which of the following is true of how packets are sent through the Internet?
Packet metadata is only included on important packets to indicate they should get access to faster paths through the network
Packet metadata is used to route and reassemble information travelling through the Internet
Information sent through the internet is only encapsulated in packets if the message is too large to be sent as a datastream
Information sent through the internet is split into two packets, one which contains the message and another which contains the metadata
Emilee is watching an online video. The video is being sent to her laptop by a server over the Internet which splits the video into packets and sends them in the order they appear in the video. Which of the following is true about how the packets will arrive at her computer?
The packets will always be received in the order that they were sent
Either every packet will reach her computer or none of them will.
Packets that arrive out of order will be sent back to the server.
The packets may arrive out of order
Which of the following best describes the purpose of an IP address?
IP addresses provide a unique number for identifying devices that send and receive information on the Internet
IP addresses assist in the reconstruction of a message that has been divided into many packets
IP addresses indicate the location where an internet-connected computing device was manufactured
IP addresses indicate how many times an individual packet has been requested by a router
Which of the following Internet protocols is MOST important in reassembling packets and requesting missing packets to form complete messages?
Transmission Control Protocol (TC
Internet Protocol (IP)
User Datagram Protocol (UDP)
HyperText Transfer Protocol (HTTP)
Two devices are connected to the Internet and communicating with one another. A squirrel chews through one of the wires in the network that is currently being used by the devices to communicate. The network immediately begins using a different path through the network and communication continues as normal.
This situation best exemplifies which principle?
fault-tolerance
scalability
protocol
pathing
An Internet Service Provider (ISP) is a company that builds the routers and wired connections that allow individuals to access the Internet.
An ISP is considering adding additional redundant connections to its network. Which of the following best describes why the company would choose to do so?
The protocols of the Internet only work on networks that are redundant
It costs less to design a network that is redundant
Redundant networks are more reliable
Adding additional connections reduces the fault-tolerance of the network
Which of the following situations is most likely to cause issues arising from the digital divide?
A state makes voter registration forms available only by visiting a government website
Two internet-connected devices located in different countries and thousands of miles apart attempt to communicate with one another
Packets sent from one router to another begin arriving in a different order than they were sent
A smartphone attempts to communicate over the Internet with another type of device, like a tablet or laptop
Which of the following is MOST likely to be an outcome of the digital divide?
Certain companies will be unable to certify their technology as digitally secure.
People from some racial or ethnic groups have unequal access to computing technology.
People will have equal access and influence both globally and locally.
Political groups in some countries are unable to agree on regulations of digital technology.
What is the MINIMUM number of paths that would need to be broken to prevent Computing Device A from connecting with Computing Device E?
1
2
3
4
This diagram shows a number of computing devices connected to the Internet with each line representing a direct connection.
Device A is attempting to send data over the Internet to Device E. Which of the following is true of how the data will travel through the network?
The data will always travel through Device B as it is the shortest path
The data will never be sent to Device G since there are other shorter paths available
It is possible that the data travels through any of the devices in the network before arriving at device E
If the data travels through Device D then it will not travel through Device B
Explore all questions with a free account