Data Comm Chapter 10

25 July 2022
4.7 (114 reviews)
70 test answers

Unlock all answers in this set

Unlock answers (66)
question
1. Current estimates suggest that there are more than 450 million hosts (computer sites that store and deliver Web pages) connected to the Internet.
answer
T
question
2. IP is a connection-oriented protocol.
answer
F
question
3. Currently, almost all networks involved in the Internet use IP version 6.
answer
F
question
4. The IP datagram fields Identification, Flags, and Fragment Offset are used to fragment a datagram into smaller parts.
answer
T
question
5. The Time to Live field indicates how long a particular datagram is allowed to live.
answer
T
question
6. A 16-bit address uniquely defines a connection to the Internet.
answer
F
question
7. When the user wants to send an e-mail message, the e-mail program takes the e-mail message and passes it to the transport layer of the software.
answer
T
question
8. The Window field of the TCP header cannot be set to zero.
answer
T
question
9. Like its counterpart IP, TCP is a fairly streamlined protocol.
answer
T
question
10. IP is the protocol used by most networks and network applications to create an error-free, end-to-end network connection.
answer
F
question
11. The UDP header contains only four fields—Source Port, Destination Port, Length, and Checksum.
answer
T
question
12. Every device that has a connection to the Internet is assigned an IP address.
answer
T
question
13. Home and small business local area networks often use NAT to conserve IP addresses.
answer
T
question
14. Using a Web browser, you can download and view Web pages on a personal computer.
answer
T
question
15. The Hypertext Transfer Protocol, or HTTP, is a transport layer protocol.
answer
F
question
16. Every object on the Internet has a unique English-based address called its Uniform Resource Locator (URL).
answer
T
question
17. The Internet recognizes URLs directly.
answer
F
question
18. All Uniform Resource Locators consist of six parts.
answer
F
question
19. To make IP addresses a little easier for human beings to understand, the 32-bit binary addresses are represented by dotted decimal notation.
answer
T
question
20. There are six basic forms of a classful IP address: Class A, B, C, D, E, and F.
answer
F
question
21. IP multicasting suffers from a lack of security.
answer
T
question
22. Standard Generalized Markup Language (SGML) is a markup language.
answer
F
question
23. Most HTML tags consist of an opening tag, followed by one or more attributes, and a closing tag.
answer
T
question
24. HTML pages are simple, static text documents that browsers read, interpret, and display on the screen.
answer
T
question
25. POP3 is not useful if you do not have a permanent connection to a network and must dial in using a temporary Internet connection.
answer
T
question
26. The File Transfer Protocol, or FTP, was one of the first services offered on the Internet.
answer
T
question
27. H.323 was originally designed for TCP/IP networks.
answer
F
question
28. Types of listserv software include mailserv, majordomo, and almanac.
answer
T
question
29. Intranets use essentially the same hardware and software that is used by other network applications.
answer
T
question
30. The Internet is a static entity.
answer
F
question
1. During the late 1960s, a branch of the U.S. government titled the ____ created one of the country's first wide area packet-switched networks. a. Department of Defense b. IEEE c. Advanced Research Projects Agency (ARPA) d. IETF
answer
c. Advanced Research Projects Agency (ARPA)
question
2. In 1983, the Department of Defense broke the ARPANET into two similar networks: the original ARPANET and ____. a. MILNET c. CampusNET b. NSFnet d. DoDNET
answer
a. MILNET
question
3. The National Science Foundation funded the creation of a new high-speed, cross-country network backbone called the ____. a. MILNET c. CampusNET b. NSFnet d. DoDNET
answer
b. NSFnet
question
4. The ____ is the main telecommunications line through the network, connecting the major router sites across the country. a. star topology c. mid-level network b. ARPANET d. Backbone
answer
d. Backbone
question
5. To transfer Web pages, the Internet uses the ____. a. Telnet c. e-commerce b. Hypertext Transfer Protocol (HTTP) d. Network Address Translation (NAT)
answer
b. Hypertext Transfer Protocol (HTTP)
question
6. ____ are used to select unique documents from anywhere in the world. a. Uniform Resource Locators (URLs) c. Dynamic Host Configuration Protocol b. Domain Name Systems (DNSs) d. XMLs
answer
a. Uniform Resource Locators (URLs)
question
7. The protocol that resides at the ____ layer in the TCP/IP protocol suite is called Internet Protocol (IP). a. Application c. Network b. Transport d. network access
answer
c. Network
question
8. The ____ field of an IP datagram contains the version number of IP being used, just in case a new version becomes available. a. Service Type c. Protocol b. Time to Live d. Version
answer
d. Version
question
9. The IP datagram ____ field enables the network to discard a datagram that has been traveling the Internet for too long. a. Time to Live c. Total Length b. Service Type d. IP Options
answer
a. Time to Live
question
10. The TCP header ____ field contains a 32-bit value that counts bytes and indicates a packet's data position within the connection. a. Source Port c. Sequence Number b. Padding d. Window
answer
c. Sequence Number
question
11. ____ is a no-frills transport protocol that does not establish connections, does not attempt to keep data packets in sequence, and does not watch for datagrams that have existed for too long. a. Transport Control Protocol (TCP) b. User Datagram Protocol (UDP) c. Internet Control Message Protocol (ICMP) d. Network Address Translation (NAT)
answer
b. User Datagram Protocol (UDP)
question
12. ____ takes an IP address in an IP datagram and translates it into the appropriate medium access control layer address for delivery on a local area network. a. Transport Control Protocol (TCP) c. Network Address Translation (NAT) b. User Datagram Protocol (UDP) d. Address Resolution Protocol (ARP)
answer
d. Address Resolution Protocol (ARP)
question
13. ____ lets a router represent an entire local area network to the Internet as a single IP address. a. ICMP c. ARP b. NAT d. UDP
answer
b. NAT
question
14. A ____ is a data network connection that makes use of the public telecommunications infrastructure but maintains privacy through the use of a tunneling protocol and security procedures. a. NAT network c. DHCP b. TCP network d. virtual private network (VPN)
answer
d. virtual private network (VPN)
question
15. The Point-to-Point Tunneling Protocol (PPTP) is an extension of the Internet's ____. a. Internet Protocol (IP) c. Point-to-Point Protocol (PPP) b. Transport Control Protocol (TCP) d. Address Resolution Protocol (ARP)
answer
c. Point-to-Point Protocol (PPP)
question
16. ____ is a set of protocols developed by the Internet Engineering Task Force to support the secure exchange of data packets at the IP layer. a. IPsec c. PPP b. PPTP d. SLIP
answer
a. IPsec
question
17. The Web server software accepts ____ requests from Web browsers connected to the Internet. a. ARP c. NAT b. DHCP d. HTTP
answer
d. HTTP
question
18. A(n) ____ uniquely identifies files, Web pages, images, or any other types of electronic documents that reside on the Internet. a. File Transfer Protocol (FTP) c. Uniform Resource Locator (URL) b. Internet Protocol (IP) d. Domain Name Service (DNS)
answer
c. Uniform Resource Locator (URL)
question
19. The ____ is a large, distributed database of Internet addresses and domain names. a. Uniform Resource Locator (URL) b. Domain Name System (DNS) c. Hypertext Transfer Protocol (HTTP) d. Hypertext Markup Language (HTML)
answer
b. Domain Name System (DNS)
question
20. ____ is the capability of a network server to transmit a data stream to more than one host at a time. a. IP multicasting c. TCP broadcasting b. TCP unicasting d. ICMP multicasting
answer
a. IP multicasting
question
21. ____ is a set of codes inserted into a document that is intended for display on a Web browser. a. Domain Name Service (DNS) c. Uniform Resource Locator (URL) b. Hypertext Markup Language (HTML) d. Hypertext Transfer Protocol (HTTP)
answer
b. Hypertext Markup Language (HTML)
question
22. ____ is a collection of newer markup tags and techniques that can be used to create more flexible and more powerful Web pages. a. Dynamic HTML (DHTML) c. Hypertext Transfer Protocol (HTTP) b. Address Resolution Protocol (ARP) d. Uniform Resource Locator (URL)
answer
a. Dynamic HTML (DHTML)
question
23. ____ is the computerized version of writing a letter and mailing it at the local post office. a. FTP c. e-commerce b. e-business d. Electronic mail
answer
d. Electronic mail
question
24. An e-mail program creates a(n) ____ document and attaches it to the e-mail message. a. Multipurpose Internet Mail Extensions (MIME) b. Address Resolution Message (ARM) c. Transport Control Protocol (TCP) d. Internet Protocol (IP)
answer
a. Multipurpose Internet Mail Extensions (MIME)
question
25. The ____ is an Internet protocol for sending and receiving e-mail and is used to perform the transfer. a. Address Resolution Protocol (ARP) c. File Transfer Protocol (FTP) b. Simple Mail Transfer Protocol (SMTP) d. Transport Control Protocol (TCP)
answer
b. Simple Mail Transfer Protocol (SMTP)
question
26. ____ is a client/server protocol in which e-mail is received and held for you at your Internet server. a. Hypertext Transfer Protocol (HTTP) b. File Transfer Protocol (FTP) c. Domain Name Service (DNS) d. Internet Message Access Protocol (IMAP)
answer
d. Internet Message Access Protocol (IMAP)
question
27. The primary functions of ____ are to allow a user to download a file from a remote site to the user's computer and to upload a file from the user's computer to a remote site. a. Hypertext Transfer Protocol (HTTP) b. Domain Name Service (DNS) c. File Transfer Protocol (FTP) d. Internet Message Access Protocol (IMAP)
answer
c. File Transfer Protocol (FTP)
question
28. ____ is a terminal emulation program for TCP/IP networks, such as the Internet, that allows users to log in to a remote computer. a. Remote login c. DNS b. ARP d. FTP
answer
a. Remote login
question
29. The practice of making telephone calls over the Internet has had a number of different names, including packet voice, voice over packet, voice over the Internet, Internet telephony, and ____. a. HTML c. Voice over IP (VoIP) b. SMTP d. XHTML
answer
c. Voice over IP (VoIP)
question
30. A company can use IP for transmission of data within its own network, but use traditional telephone lines outside the company network. Many people are now beginning to call such systems ____. a. private VoIP c. remote VoIP b. public VoIP d. distributed VoIP
answer
a. private VoIP
question
31. ____ is actually a set of protocols named packet-based multimedia protocols, and it was designed for a wide range of applications (audio and video). a. H.121 c. H.256 b. H.232 d. H.323
answer
d. H.323
question
32. ____ is a protocol that converts telephone numbers to fully qualified domain name addresses. a. H.323 c. SIP b. ENUM d. UDP
answer
b. ENUM
question
33. ____ involves the continuous download of a compressed audio or video file, which can then be heard or viewed on the user's workstation. a. Streaming audio and video c. File Transfer Protocol (FTP) b. Voice over IP d. XML
answer
a. Streaming audio and video
question
34.____ is a common application layer protocols that servers and the Internet use to deliver streaming audio and video data to a user's browser. a. Secure Shell (SSH) c. Real-Time Protocol (RTP) b. Transport Control Protocol (TCP) d. Voice over IP (VoIP)
answer
c. Real-Time Protocol (RTP)
question
35. Real-Time Streaming Protocol (RTSP) is a(n) ____ layer protocol. a. physical c. transport b. network d. application
answer
d. application
question
36. ____ is the electronic selling and buying of merchandise using the Web. a. VoIP c. E-mail b. E-retailing d. IM
answer
b. E-retailing
question
37. ____ is the gathering and use of the browsing habits of potential and current customers, which is important data for many companies. a. Micro-marketing c. VoIP b. E-retailing d. EDI
answer
a. Micro-marketing
question
38. A ____ is data created by a Web server that is stored on the hard drive of a user's workstation. a. javascript c. Script b. cookie d. Certificate
answer
b. cookie
question
39. One of the biggest changes to affect the Internet will be the adoption of a new version of the Internet Protocol, version ____. a. IPv3 c. IPv5 b. IPv4 d. IPv6
answer
d. IPv6
question
40. There is a plan to implement a newer, very high-speed network that will cover the United States, interconnecting universities and research centers at transmission rates up to a gigabit per second (1000 Mbps). The new high-speed network is called ____. a. IPv6 c. Internet2 b. FastEthernet d. Internet6
answer
c. Internet2