2. Ethernet is a means of implementing which of the following network topologies?

Similar documents
Chapter 4: Networking and the Internet

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Connecting with Computer Science, 2e. Chapter 5 The Internet

Protocol Data Units and Encapsulation

Internet Concepts. What is a Network?

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Advanced Higher Computing. Computer Networks. Homework Sheets

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

IP addresses. IP addresses: IPv4: 32 bits:

Detailed Table of Contents

Transport and Network Layer

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d.

Overview of Computer Networks

TCP/IP Basis. OSI Model

Technical Support Information Belkin internal use only

The OSI and TCP/IP Models. Lesson 2

The OSI Model and the TCP/IP Protocol Suite

Networking Test 4 Study Guide

LESSON Networking Fundamentals. Understand TCP/IP

M3-R3: INTERNET AND WEB DESIGN

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Network Models and Protocols

Ethernet. Ethernet. Network Devices

TCP/IP and the Internet

The Internet. Chapter 10. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Using MIS 3e Chapter 6A Appendix

Lecture 28: Internet Protocols

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

DNS Basics. DNS Basics

CMSI 182 Intro to Computer Science. Week 13 Tuesday B.J. Johnson Doolan :25 10:40

Network System Design Lesson Objectives

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers

Multi-Homing Dual WAN Firewall Router

architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Introduction to computer networks and Cloud Computing

Communications and Networking

Short notes on webpage programming languages

Networking Basics for Automation Engineers

Basic Network Configuration

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, Page 1

Sage ERP Accpac Online

Internet Privacy Options

Web Browsing Examples. How Web Browsing and HTTP Works

Computer Networks III

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

The Web Web page Links 16-3


Data Communication Networks and Converged Networks

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Chapter 5. Data Communication And Internet Technology

Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

Mathatma Gandhi University

Network Technology CMP-354-TE. TECEP Test Description

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Network Address Translation (NAT)

Web Hosting & Maintenance

Networking Basics and Network Security

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

Basic Internet programming Formalities. Hands-on tools for internet programming

DOCUMENTS ON WEB OBJECTIVE QUESTIONS

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

Terminology. Internet Addressing System

Technical Glossary from Frontier

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

COMPUTER NETWORK TECHNOLOGY (300)

How To Understand The Internet Of S (Netware)

CISC 1600 Introduction to Multi-media Computing

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL

Network Basics GRAPHISOFT. for connecting to a BIM Server (version 1.0)

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

CS3250 Distributed Systems

Networks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol

CCNA Discovery Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

TCP/IP works on 3 types of services (cont.): TCP/IP protocols are divided into three categories:

Computer Networks/DV2 Lab

CSCI 362 Computer and Network Security

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Configuring Network Address Translation (NAT)

UPPER LAYER SWITCHING

Lab - Observing DNS Resolution

Linksys E2000 Wireless-N Router Configuration Guide

ICT 6012: Web Programming

Computer Networks Vs. Distributed Systems

Introduction to Internet and WWW

Application Layer -1- Network Tools

COSC 122 Computer Fluency. Networking and the Internet. Dr. Ramon Lawrence University of British Columbia Okanagan

Transcription:

Test Bank Chapter Four (Networks and the Internet) Multiple Choice Questions 1. Which of the following is not a way of classifying networks? A. WAN versus LAN B. Closed versus open C. Router versus bridge D. Star versus bus 2. Ethernet is a means of implementing which of the following network topologies? A. Star B. WiFi C. Bus 3. Which of the following connects existing networks to form an internet? A. Bridge B. Router C. Switch D. Repeater 4. Which of the following is a protocol for controlling the right to transmit a message in a network? A. UDP B. CSMA/CD C. TCP D. FTP 5. Which of the following is not a means of performing interprocess communication over a network? A. Client/server B. ICANN C. Peer-to-peer 6. Which of the following is assigned the task of providing individual users access to the Internet? A. Tier-1 ISPs B. Tier-2 ISPs C. Access ISPs D. ICANN 7. Which of the following is not an application of the Internet? ANSWER: D A. FTP B. Email C. Telnet D. CERT 8. The primary purpose of which of the following is not the enhancement of security? A. ICANN B. Firewall C. Encryption D. CERT 9. Which of the following is used to translate between IP addresses and mnemonic addresses?

A. File server B. Mail server C. Name server D. FTP server 10. Which of the following is not a means of connecting networks? A. Switch B. Server C. Router D. Bridge 11. Which layer of the TCP/IP hierarchy actually transmits a message? ANSWER: D 12. Which layer of the TCP/IP hierarchy chops messages into units whose size is compatible with the Internet? 13. Which layer of the TCP/IP hierarchy decides the direction in which message segments are transferred across the Internet? 14. Which layer of the TCP/IP hierarchy decides which application should receive an incoming message? 15. Which layer of the TCP/IP hierarchy presents incoming messages to the computer user? 16. Which layer of the TCP/IP hierarchy reassembles messages as their pieces arrive at the destination? 17. Which layer of the TCP/IP hierarchy is responsible for obtaining the correct address for a message s destination?

18. Which of the following identifies the application to which a message arriving from the Internet should be given? A. Protocol B. Port number C. Domain D. Hop count 19. Which standards organization produced the OSI reference model for internet communication? A. ANSI B. IEEE C. ISO 20. Which of the following is an Internet application that is named after its underlying protocol? A. Email B. World Wide Web C. FTP D. UDP 21. Which of the following is not a means of implementing server-side activities? ANSWER: D A. CGI B. JSP C. ASP D. Applets 22. Which of the following is not a protocol used in the basic TCP/IP software hierarchy? A. POP3 B. UDP C. TCP D. IP Fill-in-the-blank/Short-answer Questions 1. List two network topologies. A. B. ANSWER: star and bus 2. What are two protocols for implementing the transport level in the TCP/IP hierarchy? A. B. ANSWER: TCP and UDP 3. Draw a circle the portion of the URL below that identifies the directory containing the file being addressed. Underline the portion that identifies the protocol that should be used when accessing the file. Draw a rectangle around the portion that identifies the file name itself.

http://batcave.metropolis.com/heroes/superheroes/batpage.html ircle: superheroes, underline: http, rectangle: batpage.html (or just batpage) 4. Underline the portion of the URL below that identifies the classification (top-level domain) of the registered domain in which the pertinent Web server resides. Draw a rectangle around the portion that indicates the directory path the server should follow to find the designated document. http://batcave.metropolis.com/heroes/superheroes/batpage.html ANSWER: Underline: com, rectangle: heroes/superheroes 5. Draw a rectangle around the portion of the email address below that identifies the person who should receive the message. Underline the portion that identifies the location of the mail server that handles the mail for that person. Fido@dogmail.zoo.org ANSWER: Rectangle: Fido, underline: dogmail.zoo.org 6. What bit pattern is represented by 33.42.18 in dotted decimal notation? ANSWER: 00100001 00101010 00010010 (212A12 in hexadecimal) 7. Express the bit pattern 0001001000001100 in dotted decimal notation. ANSWER: 18.12 8. The main purpose of and ISPs is to provide a system of high-speed routers that serve as the Internet s communication backbone, whereas ISPs concentrate on providing Internet access to the Internet s users. ANSWER: Tier-1, tier-2, access 9. Name three kinds of servers. A. B. C. ANSWER: Possible answers include: name server, file server, mail server, Web server, etc. 10. List four top-level domains. A. B. C. D.

ANSWER: Possible answers include com, org, edu, gov, net, uk, ca, etc. 11. What terms in the following HTML document are linked to other documents? <title>this is the title</title> <h1>favorite Animals</h1> <p>of all the animals in the world, the <a href= http://pigs.org/pigs.html >pig</a> is perhaps the most charming.</p><p>however, the <a href= http://hippopotamuscity.org/hippo.html > hippopotamus</a> is also cute.</p> ANSWER: pig, hippopotamus 12. Fill in the blanks in the HTML document below so that the term Earth will be linked to the HTML document earthinfo.html in the directory earthdir at earthnews.com. <title>earth page</title> <p>the planet we live on is called Earth </p> ANSWER: <a href= http://earthnews.com/earthdir/earthinfo.html >, </a> 13. Fill in the blanks with the missing tags to the following HTML document. Title </title> <p>click on <a href= http://this..org > this. ANSWER: The following tags are missing: <title>, >,, </a>, and </p>. 14. Fill in the blank in the following HTML document so that the image called dog.jpg will be displayed at the top of the page.

<p>above is a picture of Fido.</p> ANSWER: <img src = dog.jpg > 15. List two features of HTML that conform to the XML style. A. B. ANSWER: Possible answer include: Tags are surrounded by < and >, tags that close an item are the same as the opening tag except that / is added, tag name are in lower case, and others. 16. Identify two protocols used in networks to determine the right to transmit an original message. A. B. SMA/CD and CSMA/CA 17. Identify a protocol used in the implementation of the network layer in the TCP/IP hierarchy. ANSWER: IP 18. In each blank below write the HTML tag that performs the indication function. A. Begins the part that describes what will appear on the computer screen B. Marks the end of the HTML document C. Marks the beginning of a paragraph D. Marks the end of a term that is linked to another document. B. C. <p> D. </a> 19. The client/server model refers to a form of interprocess communication in which one process, known as the, runs continuously so that it can be contacted by other processes, known as, as needed. In contrast is the model of interprocess communication in which two processes communicate as equals. ANSWER: server, clients, peer-to-peer 20. Where would be the most likely place to put a firewall to provide each of the following services? A. Protect an entire domain from attacks from the cloud B. Protect an entire domain from spam C. Protect an individual machine from worms and viruses. At the gateway B. At the domain s mail server C. At the individual machine

21. Write the entire URL required to retrieve the Web document named bulldogs.html from the Web server at animals.org assuming that the document is stored in the directory named dogs. ANSWER: http://animals.org/dogs/bulldogs.html Vocabulary (Matching) Questions The following is a list of terms from the chapter along with descriptive phrases that can be used to produce questions (depending on the topics covered in your course) in which the students are ask to match phrases and terms. An example would be a question of the form, In the blank next to each phrase, write the term from the following list that is best described by the phrase. Term internet tier-1 ISP access ISP domain protocol cloud IP address HTML firewall packet XML FTP router dotted decimal URL search engine Ethernet UDP IP Descriptive Phrase A network of networks An organization that provides the Internet s communication backbone An organization that provides access to the Internet A name registered with ICANN for identification purposes A governing set of rules The portion of the Internet lying outside one s domain Identifies a machine on the Internet A notational system for indicating how a Web document is to be displayed by a browser A means of blocking undesired messages A message segment that is transmitted over the Internet independently A format for markup languages A protocol for transferring files A means of connecting networks to form an internet A notational system for representing bit patterns A means of identifying a document on the Web A means of finding relevant information on the Web A means of implementing a network with the bus topology A protocol for the transport layer A protocol for the network layer General Format Questions 1. What is the difference between a repeater and a bridge? oth repeaters and bridges are used to connect two buses, but a repeater transfers all messages whereas a bridge transfers only those messages destined for the other side. 2. What is the difference between hubs, switches, and routers? hub is merely a central (short) bus to which computers are connected to form a bus network. A switch connects several bus networks to form a larger network. A router connects two networks to form an internet in which the original two networks continue to function as independent networks. 3. Many people use the terms Internet and world-wide web interchangeably. What is the difference between the Internet and the world-wide web?

ANSWER: The Internet is the infrastructure used by the world-wide web. That is, the world-wide web is only one application of the Internet. Other applications include email, ftp, and telnet. 4. What are HTML and XML? ANSWER: HTML is an actual markup language. XML is not a markup language itself. Instead it is a markup language style. 5. What are some distinctions between UDP and TCP? ANSWER: UDP is a connectionless protocol whereas TCP establishes a two way communication between the origin and destination of a message. TCP is a reliable protocol in that the origin and destination work together to confirm that the entire message was successfully transferred. In contrast, UDP merely transmits the message without confirming it reception. 6. As an encryption system, what is unique about public-key encryption (that is, why is public-key encryption so named)? ANSWER: In a public-key encryption system, knowing the encryption key does not allow one to decipher a message. Thus, the encryption key can be public knowledge without violating security. 7. Draw a sketch showing how the following HTML document would appear on the computer screen when displayed by a browser. <title>this is the title</title> <h1>mud Art</h1> ANSWER: The displayed page contains only the words Mud Art displayed as a major heading. The words This is the title are NOT part of the displayed page. 8. Draw a sketch showing how the following HTML document would appear on the computer screen when displayed by a browser. <title>this is the title</title> <h1>favorite Animals</h1> <p>of all the animals in the world, the <a href= http://pigs.org/pigs.html >pig</a> is perhaps the most charming.</p><p>however, the <a href= http://hippopotamuscity.org/hippo.html > hippopotamus</a> is also cute.</p> ANSWER: Something like this: Favorite Animals Of all the animals in the world, the pig

is perhaps the most charming. However, the hippopotamus is also cute. 9. What would happen if a user clicked the mouse on the term pig while viewing the HTML document shown below? <title>this is the title</title> <h1>favorite Animals</h1> <p>of all the animals in the world, the <a href= http://pigs.org/pigs.html >pig</a> is perhaps the most charming.</p><p>however, the <a href= http://hippopotamuscity.org/hippo.html > hippopotamus</a> is also cute.</p> ANSWER: The browser would retrieve and display the document pigs.html. 10. To what do the terms server side and client side refer? ANSWER: They indicate whether the identified activity is performed by the client or the server when using the client/server model for interprocess communication. 11. What assumptions are made when a URL is denoted by merely zoo.org? ANSWER: It is assumed that the protocol is http and that the document desired is the default document in the default directory. 12. Briefly summarize the steps performed by each of the four layers in the TCP/IP hierarchy at the computer at which a message originates. pplication layer: originates the message and obtains destination s IP address. Transport layer: chops message into segments and assigns sequence numbers. Network layer: determines intermediate address. Link layer: transmits message segments.