When talking about the physical elements of the Internet the term redundancy refers to quizlet?

Which of the following is the core communications protocol for the Internet?

When talking about the physical elements of the Internet, the term redundancy refers to:

multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.

One of Internet2's projects is a nationwide 100 gigabit-per-second network.

The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:

In the address http://www.company.com/clients.html, which of the following is the top-level domain?

intelligent personal assistant.

Local area networks that operate within a single organization that leases access to the Web directly from regional and national carriers are called:

Google Apps is an example of cloud computing.

Which of the following occurred during the Commercialization phase of Internet development?

NSF privatized the operation of the Internet's backbone.

A(n) ________ is a Web application that allows users to easily add and edit content on a Web page.

An Internet-enabled media player would run in which layer of Internet architecture?

Which of the following is currently the most popular Web browser?

The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices.

All of the following are characteristics of HTML5 except:

support for digital rights management.

During which period of time did the Institutionalization phase of Internet development take place?

Which of the following is a Web application that enables Internet users to communicate with each other, although not in real time?

The addresses used by browsers to identify the location of content on the Web are called:

uniform resource locators.

The natural language convention used to represent IP addresses is called the:

________ is a model of computing in which firms and individuals obtain computing power and software applications over the Internet, rather than purchasing and installing it on their own computers.

Tablet computers rely on the Internet cloud for processing and storage.

The Internet and the Web have made commerce possible because they brought about an extraordinary expansion of digital services to millions of amateur computer users. The Web makes nearly all of the elements of rich human expression including color, text, images, photos, animations, sound, and video available, creating a unique environment in which to establish a commercial marketplace. Many of the Web's services and features support e-commerce, including e-mail, search engines, instant messaging (IM), chat, streaming media, and cookies.

E-mail, for example, can be used as a very effective marketing tool. E-commerce sites can buy e-mail lists from various sources and collate them with lists of their current customers to create a targeted advertising message that can be quickly and economically delivered and will produce a creditable response.

Search engines have also become a crucial tool on e-commerce sites, providing a method for customers to quickly locate the product category or a specific product they are looking for.

Instant messaging has been added to some e-commerce Web sites as a method of accessing customer support personnel.

Streaming media enables live Web video, music, video, and other large-bandwidth files to be sent to users in a variety of ways that enable the user to play back the files. Web advertisers increasingly use video to attract viewers. Streaming audio and video segments used in Web ads and news stories are perhaps the most frequently used streaming services.

Finally, cookies are a very important tool used by marketers to collect and store information about a user. These small text files are sent to the user's computer so that information from the site will load more quickly the next time they visit. More importantly from the e-tailer's perspective, cookies can retain information about the customer such as the number of pages visited, products examined, and other detailed information about a customer's behavior. Cookies enable sites to recognize returning visitors and target specific customers with special offers and marketing messages.
Page Ref: 161-166
Difficulty: Difficult

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (60)

C) 1975-1995

During which period of time did the Institutionalization phase of Internet development take place?

A) 1950-1960
B) 1961-1974
C) 1975-1995
D) 1995-through the present

D) NSF privatized the operation of the Internet's backbone.

Which of the following occurred during the Commercialization phase of Internet development?

A) The fundamental building blocks of the Internet were realized in actual hardware and software.
B) Personal computers were invented.
C) The Domain Name System was introduced.
D) NSF privatized the operation of the Internet's backbone.

B) institutional phase

During which phase of the development of the Internet was the Domain Name System (DNS) introduced?

A) commercialization phase
B) institutional phase
C) innovation phase
D) consolidation phase

B) FTP

Which of the following is not one of the basic technological foundations of the Internet?

A) client/server computing
B) FTP
C) TCP/IP
D) packet switching

C) packet switching.

The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:

A) routing.
B) the Transmission Control Protocol.
C) packet switching.
D) the File Transfer Protocol.

C) TCP/IP

Which of the following is the core communications protocol for the Internet?

A) Telnet
B) FTP
C) TCP/IP
D) TLS

C) providing communication with the application by acknowledging and sequencing the packets to and from the application

The Transport Layer of TCP/IP is responsible for which of the following?

A) placing packets on and receiving them from the network medium
B) addressing, packaging, and routing messages
C) providing communication with the application by acknowledging and sequencing the packets to and from the application
D) providing a variety of applications with the ability to access the services of the lower layers

B) addressing, packaging, and routing messages

The Internet Layer of TCP/IP is responsible for which of the following?

A) placing packets on and receiving them from the network medium
B) addressing, packaging, and routing messages
C) providing communication with the application by acknowledging and sequencing the packets to and from the application
D) providing a variety of applications with the ability to access the services of the lower layers

D) 32-bit number that appears as a series of four separate numbers separated by periods.

An IPv4 address is expressed as a:

A) 32-bit number that appears as a series of four separate numbers separated by semicolons.
B) 64-bit number that appears as a series of four separate numbers separated by semicolons.
C) 64-bit number that appears as a series of four separate numbers separated by periods.
D) 32-bit number that appears as a series of four separate numbers separated by periods.

C) domain name system

The ________ allows a natural language expression, such as Google.com to represent a numeric IP address.

A) uniform resource locator system
B) Internet protocol addressing schema
C) domain name system
D) assigned numbers and names (ANN) system

B) a uniform resource locator.

The address used by a browser to identify the location of content on the Web is called:

A) a domain name.
B) a uniform resource locator.
C) an IP address.
D) a file path.

B) Each client added to the network increases the network's overall capacity and transmission speeds.

Which of the following is not an advantage of client/server computing over centralized mainframe computing?

A) It is easy to expand capacity by adding servers and clients.
B) Each client added to the network increases the network's overall capacity and transmission speeds.
C) Client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer.
D) There is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down.

D) Cloud computing

________ is a model of computing in computer processing, storage, software, and other services which are provided as a shared pool of virtualized resources over the Internet.

A) Client/server computing
B) P2P computing
C) Mobile computing
D) Cloud computing

A) SMTP

Which of the following protocols is used to send mail to a server?

A) SMTP
B) FTP
C) HTTP
D) SSL

B) between the Transport Layer and the Application Layer

Where does TLS operate within TCP/IP?

A) between the Internet Layer and the Transport Layer
B) between the Transport Layer and the Application Layer
C) between the Network Interface Layer and the Transport Layer
D) between the Internet Layer and the Application Layer

A) A public cloud is typically used by companies with stringent privacy and security requirements.

Which of the following statements about cloud computing is not true?

A) A public cloud is typically used by companies with stringent privacy and security requirements.
B) Dropbox is an example of a public cloud.
C) Hybrid clouds offer both public and private cloud options.
D) A private cloud may be hosted internally or externally.

A) Telnet

________ is used to allow remote login on another computer.

A) Telnet
B) FTP
C) HTTP
D) SSL

A) Ping

________ is a utility program that allows you to check the connection between your client and a TCP/IP network.

A) Ping
B) Telnet
C) Tracert
D) Finger

D) client/server computing

Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture?

A) fiber optics
B) Wi-Fi
C) IPv6
D) client/server computing

A) routers

Which of the following are specialized computers that transmit message parcels along available Internet communication paths and on to their destinations?

A) routers
B) Web servers
C) IP servers
D) packet servers

A) protocol

Which of the following is a set of rules for transferring data?

A) protocol
B) packet
C) router
D) IP address

D) FiOS

Which of the following is not a basic type of cloud computing service?

A) IaaS
B) PaaS
C) SaaS
D) FiOS

B) root servers

Which of the following are central directories that list all domain names currently in use for specific domains?

A) Web servers
B) root servers
C) client servers
D) DNS servers

B) to link large mainframe computers on different college campuses

Which of the following was the original purpose of the Internet?

A) to provide a network that would allow businesses to connect with consumers
B) to link large mainframe computers on different college campuses
C) to develop a military communications system that could withstand nuclear war
D) to enable government agencies to track civilian communications

D) Tracert

Which of the following is a utility program that allows you to track the path of a message sent from a client computer to a remote computer on the Internet?

A) Telnet
B) Ping
C) IMAP
D) Tracert

B) BGP

Which of the following protocols enables the exchange of routing information among different autonomous systems on the Internet?

A) HTTP
B) BGP
C) FTP
D) SMTP

B) ISOC

Which of the following organizations monitor Internet policies and practices?

A) IETF
B) ISOC
C) W3C
D) ICANN

C) Transport Services and Representation Standards layer

TCP/IP operates in which layer of Internet architecture?

A) Network Technology Substrate layer
B) Middleware Services layer
C) Transport Services and Representation Standards layer
D) Applications layer

D) Applications layer

The Web runs in which layer of Internet architecture?

A) Network Technology Substrate layer
B) Middleware Services layer
C) Transport Services and Representation Standards layer
D) Applications layer

B) Middleware Services layer.

The layer of Internet architecture that ties the applications to the communications network and includes security and authentication services is called the:

A) Network Technology Substrate layer.
B) Middleware Services layer.
C) Transport Services and Representation Standards layer.
D) Applications layer.

B) Tier 1 ISPs.

The backbone of the Internet is formed by:

A) Internet Exchange Points (IXPs).
B) Tier 1 ISPs.
C) Network Access Points (NAPs).
D) Metropolitan Area Exchanges (MAEs).

D) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.

When talking about the physical elements of the Internet, the term redundancy refers to:

A) transmitting multiple copies of a single packet to safeguard against data loss.
B) the use of tiered high-speed switching computers to connect the backbone to regional and local networks.
C) delays in messages caused by the uneven flow of information through the network.
D) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.

D) Internet Society (ISOC)

The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices.

A) Internet Engineering Steering Group (IESG)
B) World Wide Web Consortium (W3C)
C) Internet Engineering Task Force (IETF)
D) Internet Society (ISOC)

A) IAB

The ________ helps define the overall structure of the Internet.

A) IAB
B) IESG
C) W3C
D) ITU

A) Most smartphones use Intel chips.

Which of the following is not true about the mobile platform?

A) Most smartphones use Intel chips.
B) Smartphones and tablet computers are the primary means to access the Internet, both in the United States and worldwide.
C) Most smartphones use either Google's Android or Apple's iOS operating systems.
D) Smartphones use flash memory chips.

D) IANA

Which of the following organizations involved with Internet governance has the United States recently given up control over?

A) ICANN
B) IGF
C) NTIA
D) IANA

D) 40%

In the United States, about ________ of Internet traffic now occurs over Internet Protocol version 6 (IPv6).

A) 10%
B) 15%
C) 25%
D) 40%

A) the falling cost of sensors

Which of the following is not a concern about IoT?

A) the falling cost of sensors
B) interoperability
C) security
D) privacy

B) drones

What type of Internet access technology are Google and Facebook hoping to use to provide Internet access to remote parts of the world?

A) Bluetooth
B) drones
C) WLANs
D) EDI

C) Most U.S. homes have fiber connections.

Which of the following statements about fiber-optic cable is not true?

A) It transmits more data at faster speeds than coaxial or twisted pair cable.
B) It is thinner and lighter than coaxial or twisted pair cable.
C) Most U.S. homes have fiber connections.
D) Long-haul fiber optic networks are typically owned by firms referred to as Tier I ISPs.

A) Wi-Fi and Bluetooth.

The major technologies used with wireless local area networks are:

A) Wi-Fi and Bluetooth.
B) Wi-Fi and WiMax.
C) Bluetooth and 3G.
D) WiMax and 3G.

A) 802.11ad

Which of the following IEEE standards provide for high-speed short-range Wi-Fi?

A) 802.11ad
B) 802.11ay
C) 802.11ah
D) 802.11af

D) W3C.

All of the following are involved in the effort to create standards for IoT except:

A) AllSeen Alliance.
B) Industrial Internet Consortium.
C) Open Connectivity Foundation.
D) W3C.

C) Microsoft

All of the following either currently, or have plans to, offer Internet access via satellite except:

A) Facebook
B) Dish
C) Microsoft
D) Boeing

C) unused, low-powered television channels

Microsoft's pilot program to provide broadband Internet access to rural areas uses which of the following technologies?

A) satellites
B) drones
C) unused, low-powered television channels
D) high altitude balloons

B) Mosaic.

The first web browser to make it possible to view documents on the Web with colored background, images, and animations was:

A) Netscape Navigator.
B) Mosaic.
C) Mozilla.
D) Internet Explorer.

A) .com

In the address http://www.company.com/clients.html, which of the following is the top-level domain?

A) .com
B) company.com
C) www
D) http

D) an RSS aggregator.

You could expect to find all of the following services in a web server software package except:

A) security services.
B) FTP.
C) search engine.
D) an RSS aggregator.

C) Chrome

Which of the following was the most popular web browser as of August 2018?

A) Internet Explorer
B) Safari
C) Chrome
D) Firefox

D) GML

The concept behind document formatting had its roots in which of the following?

A) XML
B) SGML
C) HTML
D) GML

D) HTML5 stores page content into mobile device hardware rather loading into the browser from a web server.

All of the following statements about HTML5 are true except:

A) HTML5 has become the de facto web page development standard.
B) HTML5 is an important tool for both response web design and adaptive web delivery.
C) HTML5 apps work just like web pages.
D) HTML5 stores page content into mobile device hardware rather loading into the browser from a web server.

A) intelligent digital assistant.

Cortana is a type of:

A) intelligent digital assistant.
B) widget.
C) gadget.
D) social network.

B) online forum

Which of the following enables Internet users to communicate with each other, although not in real time?

A) mobile messaging
B) online forum
C) SMS messaging
D) VoIP

D) Feedly

Which of the following is not a mobile messaging application?

A) Kik
B) WhatsApp
C) Viber
D) Feedly

A) wiki

A(n) ________ allows users to easily add and edit content on a web page.

A) wiki
B) podcast
C) blog
D) RSS feed

A) VoIP.

The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called:

A) VoIP.
B) IPTP.
C) VTP.
D) IP.

A) virtual reality

Google Cardboard is an example of which of the following?

A) virtual reality
B) artificial intelligence
C) augmented reality
D) chatbot

B) iOS apps are cross-platform, open-source applications.

All of the following statements about mobile apps are true except:

A) mobile apps have usurped television as the most popular entertainment medium.
B) iOS apps are cross-platform, open-source applications.
C) over 200 billion apps have been downloaded from the Apple App Store.
D) almost all the top 100 brands have a presence in at least one of the major app stores.

D) Swift

Which of the following is a programming language introduced by Apple specifically for developing iOS applications?

A) Objective-C
B) C
C) C++
D) Swift

B) Java

Applications for Android operating system-based smartphones are typically written in which of the following?

A) Swift
B) Java
C) ActiveX
D) ColdFusion

Sets with similar terms

Ecommerce midterm chapter 3

60 terms

abirashid

Chapter 3 E-Commerce

25 terms

soupaa

Ecommerce Quiz 2

18 terms

ewolski22

CNT100 Chapter 5 Review Questions

25 terms

Deanna_Medina

Other sets by this creator

Consumer Behavior Chapter 9

68 terms

winnie_effendy_akub

Consumer Behavior Chapter 8

84 terms

winnie_effendy_akub

Consumer Behavior Chapter 7

55 terms

winnie_effendy_akub

Consumer Behavior Chapter 6

49 terms

winnie_effendy_akub

Other Quizlet sets

How Things Work Chapter 10

28 terms

nbuckskin

U2: photosynthesis

12 terms

meclaire

Cardiac - Week 7

58 terms

alyssaolivia913PLUS

Chapter 16 radiology

37 terms

hahanowayjosePLUS

Related questions

QUESTION

You recently set up a DHCP server, and you need to configure your computer to start using it. Click the IPv4 Properties option that you would select to use the DHCP server to receive IP configuration information.

2 answers

QUESTION

What periodic inspection is required in order to remain in compliance with the regulations regarding GMDSS ship radio station inspections?

9 answers

QUESTION

What is the mandatory label in the label stack of the header in time-division multiplexing over Internet protocol (TDMoIP) and is used to carry a circuit bundle identifier?

2 answers

QUESTION

Gwen is investigating an attack. An intruder managed to take over the identity of a user who was legitimately logged in to Gwen's company's website by manipulating Hypertext Transfer Protocol (HTTP) headers. Which type of attack likely took place?

15 answers

When talking about the physical elements of the Internet the term redundancy refers to?

When talking about the physical elements of the Internet, the term redundancy refers to: multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.

Which of the following is the core communication protocol for the Internet?

Definition: TCP/IP (Transmission Control Protocol/Internet Protocol), also referred to as the Internet Protocol Suite, is the World Wide Web's core communication system that enables every Internet-connected device to communicate with every other such device simultaneously.

Which of the following was the original purpose of the Internet?

The Internet was first invented for military purposes, and then expanded to the purpose of communication among scientists. The invention also came about in part by the increasing need for computers in the 1960s.

What helps define the overall structure of the Internet?

The Internet Architecture Board (IAB), which helps define the overall structure of the Internet.