BA325 – Chapter 14
Unlock all answers in this set
Unlock answersquestion
UDP (user datagram protocol)
answer
protocol that operates instead of TCP in applications where delivery speed is important and quality can be sacrificied
question
_____ involves allowing voice packets to gain delivery importance over packets for applications like e-mail.
answer
Packet prioritization
question
A(n) _____ is a computing device that connects networks and exchanges data between them.
answer
router
question
The exploit referred to as __________ allowed hackers to leverage vulnerability in DNS software to redirect users to sites they did not request.
answer
Cache poisoning
question
Circuit-switched networks provide connection between two parties that:
answer
is dedicated for use by the parties for the duration of a connection.
question
The Internet Protocol Suite consists of the Internet Protocol and _____.
answer
Transmission Control Protocol
question
Routers don't have perfect, end-to-end information on all points in the Internet.
answer
true
question
The acronym HFT refers to:
answer
High Frequency Trading
question
The language "http" is used to create and format Web pages.
answer
False
question
Changing the letter case when typing in host and domain names does not affect the user's ability to reach the destination.
answer
TRUE
question
Peering refers to:
answer
A situation when separate ISPs connect their networking equipment together to share traffic.
question
The protocol used for exchange of mail between e-mail servers across the world is called _____.
answer
Simple Mail Transfer Protocol
question
The phrase ________ is used by technologists to refer to delay
answer
latency
question
The address one types into a Web browser is also known as a:
answer
uniform resource locator.
question
A _____ enables communication by defining the format of data and rules for exchange.
answer
protocol
question
When considering overall network speed, a system's speed is determined by its fastest component.
answer
false
question
The domain name service (DNS) is a distributed database that allows users to communicate with other computers by:
answer
mapping host and domain names to IP addresses of computers.
question
IP addresses can oftentimes be used to identify a user's geographic location.
answer
true
question
Many fear that innovation might suffer as a result of the transition of Internet services from flat rate pricing to metered usage.
answer
true
question
A(n) _____ is a temporary storage space used to speed computing tasks.
answer
cache
question
A unit of data forwarded by a network is called a _____.
answer
packet
question
Most mobile cell phone services are exempted from having to license the wireless spectrum for transmission.
answer
false
question
When the Internet really took off, much of the Internet's operating infrastructure transitioned to be supported by government grants rather than private firms.
answer
false
question
DSL technology is less efficient for service providers in the United States because many of their customers live in less-densely populated suburbs and rural areas.
answer
true
question
A technique known as _____ uses a gateway that allows multiple devices to share a single IP address. This can be useful in organizations that have a limited number of conventional IP addresses
answer
Network Address Translation (NAT)
question
_____ is the insulated copper cable commonly used by cable television providers with shielding to reduce electrical interference.
answer
Coaxial cable
question
A device gets its IP address from whichever organization is currently connecting it to the Internet.
answer
true
question
In the URL, the host name is the name of the network a user tries to connect to.
answer
false
question
_____ refers to the application transfer protocol that is used to copy files from one computer to another.
answer
File Transfer Protocol (FTP)
question
_____ is the nonprofit organization responsible for managing the Internet's domain and numbering systems.
answer
ICANN (Internet Corporation for Assigned Names and Numbers)
question
_____ involves distributing a computing or networking workload across multiple systems in order to avoid congestion and slow performance.
answer
load balancing
question
The TCP works at both ends of Internet communication.
answer
true
question
Which of the following represents the correct sequence of actions taken by the TCP at the destination computer to ensure a perfect copy of the sent message is received?
answer
Check if all sent packets are received; check if packets are damaged; request for new copies of damaged packets; put packets in correct order
question
Many residential providers of cable technology use a system that requires customers to share bandwidth with neighbors.
answer
true
question
Computer programs making decisions without any human intervention conduct most U.S. stock trading.
answer
true
question
Internet networks are _____.
answer
packet-switched networks
question
_____ is the language used to compose Web pages.
answer
HTML
question
Peering usually takes place at neutral sites called _____.
answer
IXPs
question
The User Datagram Protocol (UDP) acts as a substitute to TCP when there is a need for speed of communication, but where perfect and complete transmission quality can be sacrificed.
answer
true
question
Which of the following is true of the term Internet backbone?
answer
It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.
question
Servers or organizations do not need to be housed within a country in order to use a country code as part of their domain name.
answer
true
question
What is an example of cybersquatting?
answer
Acquiring a domain name to extort a firm, individual, product, or trademark holder
question
Which of the following applications is most likely to use UDP instead of TCP?
answer
Web-based phone calls
question
____ repeatedly sends a cluster of three packets starting at the first router connected to a computer, then the next, and so on, building out the path that packets take to their destination.
answer
Traceroute
question
One of the factors that accelerated the development of the Internet during the 1990s was:
answer
the invention of graphical Web browsing.
question
TCP and IP operate above http and the other application transfer protocols.
answer
false
question
ISPs and IXPs that carry out peering are required by the FCC to charge each other fees based on their traffic contribution.
answer
false
question
Wall Street traders often choose a colocation facility with the goal to provide high-latency connectivity to their partners.
answer
false
question
One of the disadvantages of cable technology is that:
answer
systems used by many providers require customers to share bandwidth with neighbors.
question
Popular sites like Google and Yahoo! have several computers assigned to their host names because:
answer
it ensures that the load of requests to their sites do not overwhelm a single computer.
question
Dot-com domain name registration is carried out on an auction basis to ensure the highest bidder gains rights to the desired domain name.
answer
false
question
The Internet has no center and no one owns it.
answer
true
question
The fault-tolerant nature of the DNS ensures that:
answer
the service continues functioning even if one nameserver goes down.
question
One of the functions of the IP is to:
answer
route message packets to the final destination.
question
A Web address without a file name will load content from a default page.
answer
true
question
A firm that provides hardware and services to run Web sites of others is known as a(n) _____.
answer
Web hosting service
question
The hypertext transfer protocol (http) defines the communication between:
answer
Web browsers and Web servers.
question
Web browsers and Web servers
answer
It refers to the language used to create and format Web pages.
question
"Html" is used to:
answer
create and format Web pages.
question
Key Inc., an American guitar maker, recently lost an action to recover the domain name piano-key.com, claiming that the defendant infringed on its registered trademark. What did Key Inc. specifically accuse the defendant of?
answer
Cybersquatting
question
Circuit-switched networks are advantageous because they offer an inexhaustible supply of bandwidth for telecommunications.
answer
false
question
Routing protocol that is in charge of forwarding packets on the Internet is known as voice over Internet protocol.
answer
false