Docstoc

Chapter 6 The Internet

Document Sample
Chapter 6  The Internet Powered By Docstoc
					Chapter 6: The Internet


TRUE/FALSE

  1.   The octets in an IP address correspond to a Web site address.
  2.   All IP addresses are static.
  3.   All IP addresses are dynamic.
  4.   The www in a URL is part of a domain name.
  5.   You must pay for a domain name.
  6.   You may use an analog modem even if your phone service is digital.
  7.   You must have a digital modem if your telephone system is digital.
  8.   Television and data signals are carried over the same cable.
  9.   Internet anywhere technology is now considered a standard.
 10.   You can use a hotspot for mobile Internet access.
 11.   To use portable satellite technology you must take your satellite with you.
 12.   You can use a USB port to connect your wireless modem card to your laptop.
 13.   Cloud computing is the term given to analyzing cloud patterns and with the help of the computer
       predicting the weather.
 14.   FTP is a protocol used by Internet phone companies for free long distance.
 15.   P2P file sharing allows users to obtain files from other users on the Internet.
 16.   Bit-Torrent uses P2P technology.
 17.   One of the most common ways of gaining unauthorized access to a network is by looking for open
       ports.
 18.   Accessing Internet mobility is possible with most of today’s wired or wireless Internet
       technologies.
 19.   The quality of VoIP calls are independent of the speed of the Internet connection.
 20.   Most firewall software is preconfigured to block only unnecessarily open ports targeted by
       hackers.


MODIFIED TRUE/FALSE

  1. An constant connection uses a static or dynamic IP address. _________________________
  2. Downstream speed is the rate of data transmitted from your computer to the Internet.
     _________________________
  3. A domain name ends with an extension that indicates its top-level domain.
     _________________________
  4. Mobile Internet access allows you to easily move your access device, as in the case of vehicle-
     mounted satellite dishes that can be deployed when the vehicle is parked.
     _________________________
  5. When transmitting data using ISDN, you use a ISDN terminal modem.
     _________________________
  6. Using an AO/DI increases your computer’s vulnerability to hackers.
     _________________________
  7. The big bonus of portable WiMAX is that you use the same Internet service provider whether you
     are at home or on the road. _________________________
  8. The speed of the transmission at a hotspot is related to the speed of the wired line that connects it
     to the Internet. _________________________
  9. A GSM/GPRS phone transmits data at a much slower speed than an EDGE.
     _________________________

       1|P ag e
 10. Most messaging is based on a client/server technology. _________________________
 11. VoIP can automatically direct emergency responders to your location in the case of an emergency.
     _________________________
 12. Distributed grids tap into thousands of PCs and Macs with Internet connections whose owners rent
     their computer’s idle hours to a grid processing task. _________________________
 13. In the context of networking, a(n) virus-protector is software or hardware designed to filter out
     suspicious packets attempting to enter or leave a computer. _________________________
 14. NATS are intended to work on LANs to monitor and direct packets.
     _________________________
 15. Setting up a secure VPN is easy. _________________________


MULTIPLE CHOICE

  1. The Internet began with a project called ____.
     a. NSF                                         c. ARPANET
     b. AOL                                         d. WWW
  2. There are estimated to be more than ____ users of the Internet.
     a. 1.5 million                                 c. 1.5 trillion
     b. 1.5 billion                                 d. 100 million
  3. Network Service Providers include ____.
     a. AT&T                                        c. British Telecom
     b. Deutsche Telekom                            d. all of the above
  4. An ISP may provide ____ services.
     a. e-mail                                      c. instant messaging
     b. Web server                                  d. all of the above




      2|P ag e
 5. The accompanying figure represents the connection of your computer to the Internet; the router
    marked A should belong to a(n) ____.
    a. ISP                                       c. company
    b. NSP                                       d. none of the above
 6. The accompanying figure represents the connection of your computer to the Internet; the router
    marked B should belong to a(n) ____.
    a. ISP                                       c. company
    b. NSP                                       d. none of the above
 7. In the accompanying figure, C points to ____.
    a. an ISP                                     c. the Internet backbone
    b. an NSP                                     d. an Internet router
 8. An IP address corresponds to a ____.
    a. network class                                 c. network configuration
    b. network location                              d. none of the above
 9. An address on the Web is called a(n) ____.
    a. domain name                                   c. URL
    b. ISP                                           d. NAP address
10. ____ is a valid top-level domain.
    a. .ca                                           c. .gog
    b. .can                                          d. .aol
11. Every domain name corresponds to a unique IP address that has been entered into a ____.
    a. domain database                           c. name server
    b. domain name server                        d. none of the above
12. Prefixes such as http://, www, and ftp: correspond to ____.
    a. parts of the Internet                        c. protocols
    b. domain names                                 d. addresses
13. A ____ is described as a virtual device because it is not a physical circuit or mechanism.
    a. modem                                        c. port
    b. router                                       d. gateway
14. You need your own domain name if ____.
    a. you use the Internet                          c. you have your own Web site
    b. you have always-on connection                 d. you have a router
15. Domain names are assigned by ____.
    a. government                                    c. CANN
    b. ICANN                                         d. Internet
16. The elapsed time for data to make a round trip from point A to point B and back is called ____.
    a. speed                                        c. mHz
    b. latency                                      d. access time
17. The rate of data that is transmitted from your computer to the Internet is ____.
    a. downstream speed                              c. download speed
    b. upstream speed                                d. upload speed



     3|P ag e
18. The rate of data arriving at your computer is ____.
    a. downstream speed                             c. download speed
    b. upstream speed                               d. upload speed
19. A fixed Internet connection that uses a voiceband modem and telephone lines is a ____
    connection.
    a. dial-up                                      c. DSL
    b. fixed                                        d. ISDN




20. In the accompanying figure, the type of signal represented by A is a(n)____.
    a. digital signal                               c. sine signal
    b. analog signal                                d. cosine signal
21. In the accompanying figure, the type of signal represented by B is a(n)____.
    a. digital signal                               c. sine signal
    b. analog signal                                d. cosine signal
22. Some ISDN providers offer a service called ____, which remains connected to an ISP as long as
    the computer and terminal adapter are on.
    a. AO/DI                                      c. VDSL
    b. DSL                                        d. HDSL
23. All of the following EXCEPT ____ are considered high-speed connections.
    a. ISDN                                      c. cable
    b. DSL                                       d. all are high-speed
24. DSL uses ____ to transmit data.
    a. phone lines                                   c. T1 lines
    b. cable connections                             d. none of the above
25. A ____ is a device that connects a computer to a telephone line and converts computer data signals
    into signals compatible with DSL.
    a. DSL filter                                   c. DSL modem
    b. DSL converter                                d. DSL adapter
26. ____ currently offers the fastest Internet access speeds.
    a. ISDN                                           c. Satellite
    b. DSL                                            d. Cable
27. Cable Internet service needs ____.
    a. Circuitry to handle Ethernet protocols and a cable modem
    b. a cable modem and router
    c. Internet protocols and a cable modem
    d. a cable modem and phone lines


     4|P ag e
28. The speed for satellite Internet service is ____.
    a. faster downstream than upstream
    b. slower downstream than upstream
    c. the same downstream and upstream
    d. not determined by upstream or downstream
29. Satellite Internet service and TV service requires ____.
    a. two satellite dishes                          c. two satellites dishes and two modems
    b. a satellite dish and a modem                  d. one satellite dish and two modems
30. ____ wireless Internet service is designed to offer Internet access to homes and businesses by
    broadcasting data signals over areas large enough to cover most cities and outlying areas.
    a. Mobile                                        c. WiFi
    b. Cellular                                      d. Fixed
31. An Ethernet-compatible network standard designed as IEEE 802.16 is ____.
    a. WiFi                                      c. WiMAX
    b. WiLAN                                     d. WiMAN
32. Portable Internet access includes all of the following EXCEPT ____.
    a. WiFi                                           c. portable wireless
    b. portable satellite                             d. cellular
33. The ability to easily move your Internet service from one location to another is considered ____
    Internet service.
    a. mobile                                        c. moving
    b. portable                                      d. cellular
34. ____ is an up-and-coming standard destined to be deployed by ISPs and cell phone carriers to
    allow seamless hand-offs between one tower and another.
    a. WiMAX                                       c. Portable WiMAX
    b. Mobile WiMAX                                d. Mobile WiFi
35. Data transport rates depend on the technology of the cellular system. The generation of cellular
    technology associated with analog voice service is ____.
    a. 1G                                          c. 2.5G
    b. 2G                                          d. 3G
36. Data transport rates depend on the technology of the cellular system. The generation of cellular
    technology that was first associated with always-on data transfers ____.
    a. 1G                                           c. 2.5G
    b. 2G                                           d. 3G
37. The fastest cellular technology is ____.
    a. EDGE                                             c. HSUPA
    b. EV-DO                                            d. all of the above
38. ____ is a 3G technology that works on GSM and GPRS cellular networks.
    a. EDGE                                     c. HSUPA
    b. EV-DO                                    d. all of the above
39. ____ is a 3G technology developed by Qualcomm and currently deployed by Alltel, Sprint, and
    Verizon.
    a. EDGE                                     c. HSUPA
    b. EV-DO                                    d. none of the above

     5|P ag e
40. ____ is a 3.5G technology with theoretical maximum speeds in excess of 5 Mbps.
    a. EDGE                                        c. HSUPA
    b. EV-DO                                       d. none of the above
41. With a data service plan, you can use ____ to take advantage of mobile broadband.
    a. cell phone as a modem                        c. external modem
    b. WiFi                                         d. none of the above
42. A communication protocol that provides Internet access from handheld devices is ____.
    a. WAP                                        c. HAP
    b. WIP                                        d. HIP
43. The disadvantage of WAP-enabled devices is their ____.
    a. access speed                              c. battery life
    b. screen size                               d. all of the above
44. You can use a service called ____ to reformat Web pages to fit on a small screen.
    a. Squizit                                     c. Kweezer
    b. Skweezer                                    d. Squeezer
45. Most messaging is based on a(n) ____ model.
    a. P2P                                      c. LAN
    b. client/server                            d. Internet
46. For instant messaging, ____ are the people in a participant's list who are currently online.
    a. buddies                                      c. clients
    b. pals                                         d. friends
47. Messaging and chat protocols include all of the following EXCEPT ____.
    a. IRC                                          c. Jabber
    b. MSNP                                         d. Talkie
48. Messaging systems that require client software includes ____.
    a. Apple iChat                                  c. Yahoo! Messenger
    b. AOL Instant Messenger                        d. all of the above
49. Instant messaging is vulnerable to malware such as ____.
    a. viruses                                     c. both a and b
    b. spyware                                     d. neither a nor b
50. To use VoIP you must use any of the following EXCEPT ____.
    a. an IP phone                                c. a wireless IP phone
    b. a cable phone                              d. a USB phone




     6|P ag e
51. The accompanying figure is a screenshot of FileZilla, in which the ____ file will go to the location
    pointed to by box A.
    a. downloaded                                  c. redirected
    b. uploaded                                    d. remastered
52. The accompanying figure is a screenshot of FileZilla, in which the file to be ____ is indicated by
    box B.
    a. uploaded                                    c. reloaded
    b. downloaded                                  d. remastered
53. The accompanying figure is a screenshot of FileZilla, in which the ____ of the transfer is indicated
    by box C.
    a. index                                       c. status
    b. resolution                                  d. dimension
54. The ____ protocol allows the transfer of files from one computer to another over any TCP/IP
    network.
    a. ftp                                           c. P2P
    b. http                                          d. BitTorrent
55. ____ is a file sharing protocol that distributes the role of the file server across a collection of
    dispersed computers.
    a. ftp                                             c. P2P
    b. http                                            d. BitTorrent



     7|P ag e
56. A group of computers temporarily networked to download a file is a ____.
    a. swarm                                     c. leech
    b. seed                                      d. choker
57. BitTorrent can be used to distribute ____.
    a. spyware                                      c. malware
    b. adware                                       d. all of the above
58. Network services such as the Web, ftp, and e-mail operate from ____.
    a. routers                                    c. ports
    b. gateways                                   d. portals
59. The use of automated software to locate computers that are vulnerable to unauthorized access is a
    port ____.
    a. search                                     c. dig
    b. probe                                      d. pry
60. The average “survival time” for an unprotected computer to remain uncompromised is only ____.
    a. 9 seconds                                   c. 9 hours
    b. 9 minutes                                   d. 9 days
61. In order to ensure your ports are inactive you should ____.
    a. turn off the computer                         c. activate the screen saver
    b. put the computer in sleep mode                d. use a firewall
62. ____ are intended to work on LANs to monitor and direct packets being transported from one
    device to another.
    a. Routers                                   c. Filters
    b. Gateways                                  d. Firewalls
63. A ____ IP address is one which can be accessed by packets on the Internet.
    a. static                                     c. routable
    b. dynamic                                    d. private




     8|P ag e
64. The accompanying figure represents a Virtual Private Network. In this figure, A points to a(n)
    ____.
    a. corporate network                          c. router
    b. remote access server                       d. ISP
65. The accompanying figure represents a Virtual Private Network. In this figure, B points to a(n)
    ____.
    a. corporate network                          c. router
    b. remote access server                       d. ISP
66. The accompanying figure represents a Virtual Private Network. In this figure, C points to a(n)
    ____.
    a. corporate network                          c. router
    b. remote access server                       d. ISP
67. The accompanying figure represents a Virtual Private Network. In this figure, D points to a(n)
    ____.
    a. encrypted channel                          c. VPN channel
    b. Internet connection                        d. Internet channel



     9|P ag e
68. The accompanying figure represents a Virtual Private Network. In this figure, E points to a(n)
    ____.
    a. Server                                     c. Internet channel
    b. Internet                                   d. ISP
69. The accompanying figure represents a Virtual Private Network. In this figure, F points to a(n)
    ____.
    a. remote access server                       c. local server
    b. ISP                                        d. local PC
70. The accompanying figure represents a Virtual Private Network. In this figure, G points to a(n)
    ____.
    a. corporate network                          c. ISP
    b. remote access server                       d. remote PC


     Case-Based Critical Thinking Questions
     Case 6-1

     Tom is currently using dial-up for his Internet connection but he believes it is too slow for his
     needs and ties up his phone line. He is looking for an alternative and has come to you for help.

71. Tom wants to know which Internet access is the fastest. You tell him ____ .
    a. DSL                                        c. satellite
    b. ISDN                                       d. cable
72. Tom wants to know which of the services uses his existing telephone lines. You tell him ____.
    a. DSL                                        c. both a and b
    b. ISDN                                       d. neither a or b
73. Tom wants to know which service has the overall lower costs. You tell him, on a monthly basis, it
    is ____.
    a. ISDN                                      c. cable
    b. DSL                                       d. satellite
     Case-Based Critical Thinking Questions
     Case 6-2

     Sally often travels for her business. She needs a way to access the Internet while away from home.
     She has come to you for help.

74. Sometimes Sally wants to browse the Internet while sitting and enjoying a cup of coffee. She has
    heard that Starbucks has WiFi but she knows there are some limitations. You tell her ____.
    a. it is very expensive                       c. the signal is not strong everywhere
    b. access speed is slow                       d. all of the above
75. You describe WiMAX to Sally. You tell her ____.
    a. you can use the same provider for home and mobile use
    b. you must get a “day pass” to use WiMAX if you are outside your home
    c. it is great and that there is wide coverage
    d. all of the above



     10 | P a g e
 76. Another option Sally is considering is a portable satellite system. She asks you about the details
     and you tell her ____.
     a. you must take your satellite dish with you
     b. your disk can move out of alignment and must be repositioned
     c. they work well for browsing the Web
     d. all of the above
 77. Sally has heard that cellular data service has poor quality. You tell her ____.
     a. that it is always poor
     b. that it is never poor
     c. that it depends on the generation of technology being used
     d. that it depends totally on the carrier
      Case-Based Critical Thinking Questions
      Case 6-3

      Harry is concerned about Internet security. He knows very little about the subject but does know it
      has been in the news a great deal lately. He needs your advice.

 78. You and Harry are discussing firewalls. You explain that he has a firewall built into Windows. He
     says he has one that came with his virus protection. He should ____.
     a. disable both
     b. use only the one that came with Windows
     c. turn the one that came with Windows off and use the firewall that came with his virus
         protection
     d. use both
 79. Harry’s grandson has been coming to his house and downloading music. His grandson turned “file
     sharing” on. He is concerned this causes security problems. He should ____.
     a. deactivate it when not needed                c. get an additional firewall
     b. get anti-sharing software                    d. forget it and not worry
 80. Harry’s daughter has a VPN. He has decided he wants to be current and wants one also. You tell
     him ____.
     a. that you will go buy one
     b. that he already has one as a part of Windows
     c. that he can download it
     d. that it is used by corporations and he doesn’t need it


COMPLETION

  1. Connecting two or more networks creates a/an ____________________.

  2. A network of high-capacity communication links is the Internet ____________________.

  3. A company that offers Internet access to individuals is a/an
     ___________________________________.

  4. A(n) ____________________ contains circuitry that converts various data-carrying signals from
     your computer to signals that can travel over various communications channels.


      11 | P a g e
 5. The primary protocol suite responsible for message transmission on the Internet is
    ____________________________________________________________.

 6. The rate of data arriving at your computer is downstream ____________________.

 7. The type of Internet access that allows you to use the Internet as you are on the go is
    ____________________.

 8. A fixed Internet connection that uses a voice band modem and telephone line to transport data is
    ____________________.

 9. The type of Internet connection that moves data at speeds of 64 Kbps or 128 Kbps over ordinary
    telephone lines is _____________________________________________.

10. A high-speed, digital, always-on, Internet access technology is
    ______________________________.

11. An area in which the public can access a WiFi network is called a ____________________.

12. A communication protocol that provides Internet access from hand-held devices is called
    ______________________________.

13. For the real Internet, cellular service providers offer data services, sometimes referred to as mobile
    ____________________.

14. Group communication on the Internet where users exchange messages in real-time is called
    ____________________.

15. A technology in which a broadband Internet connection is used to place telephone calls is called
    Voice over ____________________.

16. An analog telephone adapter converts analog voice signals into digital data
    ____________________.

17. A computing system in which a network of computers are harnessed together to perform
    processing tasks is called a(n) ____________________ computing system.

18. Any access to data or programs by hackers, criminals, or other unauthorized persons is
    ____________________.

19. The type of IP address that is essentially hidden from hackers is a(n) ____________________ IP
    address.

20. The process your router uses to keep track of packets and their corresponding private or public IP
    addresses is network address ____________________.




     12 | P a g e
MATCHING

       Identify the letter of the choice that best matches the phrase or definition.
       a. anonymous FTP                                  g. asymmetric Internet connection
       b. private IP address                             h. VPN
       c. symmetric Internet connection                  i. NAP
       d. static IP address                              j. dynamic IP address
       e. ping                                           k. Internet backbone
       f. routable IP address                            l. fixed wireless Internet service
  1.   Provides the main routes for data traffic across the Internet
  2.   An Internet utility that sends a signal to a specific Internet address and waits for a reply
  3.   Upstream and downstream speeds are the same
  4.   Wireless broadband service
  5.   Does not use a password
  6.   Upstream and downstream speeds are different
  7.   Non-routable IP address
  8.   Temporarily assigned address
  9.   Permanently assigned address
 10.   Network links tied together
 11.   Can be accessed by packets on the Internet
 12.   A corporate solution for Internet security



ESSAY

  1. Explain the difference between portable Internet access and mobile Internet access.

  2. Explain what VoIP is and how it works.

  3. Explain what BitTorrent is, how it works, and how it differs from conventional uploading and
     downloading technology.




       13 | P a g e

				
DOCUMENT INFO
Shared By:
Tags:
Stats:
views:2250
posted:9/19/2011
language:English
pages:13