Thursday 2 February 2017

Which of the following networks had these two goals: a) allowing scientists to work together on

          Which of the following networks had these two goals: a) allowing scientists to work together on scientific projects; and, b) functioning even if part of the network was destroyed by a nuclear attack?
a.
W3C
b.
IBMNet
c.
ARPANET
d.
NSFnet


ANS:  C                   

   52.   A host in a network performs which of the following tasks?
a.
ensures satellite communications are functional
b.
exclusively monitors wireless networks to search for data transmission errors
c.
routes transmissions over a network to guarantee data reaches its intended destination
d.
provides services and connections to other computers on the network


ANS:  D                   

   53.   What configuration of complex networks and hosts became known as the Internet?
a.
NSFnet was connected to ARPANET
b.
IBMNet joined with ARPANET
c.
NSFnet included W3C
d.
Hosts linked ARPANET, IBMNet, and NSFnet to form DARPA


ANS:  A                    

   54.   To what does the term, traffic, refer to when used in conjunction with the Internet?
a.
the number of computers on the Internet
b.
the communications activity on the Internet
c.
all the wired, wireless, and satellite connections on the Internet
d.
the wires, fiber optics, underground cables, and radio signals used to carry the data and information across the Internet


ANS:  B                   

   55.   What is the role of the W3C?
a.
own and control the Internet
b.
oversee research and set standards for many areas of the Internet
c.
control the World Wide Web; monitor and govern the use of data and information communicated over the Intenet
d.
supervise and approve corporate and commercial use of the World Wide Web


ANS:  B                   

   56.   What is the goal of Internet2?
a.
replace Internet1
b.
It is the same as Internet; it has no particular goal.
c.
develop and test advanced Internet technologies
d.
ensure telemedicine, digital libraries, high-definition video, and Internet fraud detection all can be available over the Internet


ANS:  C                    

   57.   Which of the following identifies broadband Internet connections?
a.
FTP, OSP, IP
b.
DSL, Wi-Fi, cellular radio network
c.
IP, Wi-Fi, FTTP
d.
OSP, cellular radio network, FTP


ANS:  B                    

   58.   If your friend is enjoying a cup of coffee in a trendy coffee shop and at the same time is surfing the Web, which of the following is she using?
a.
FFT
b.
SIS
c.
a hotspot
d.
Fixed Limited Online Access Transport (FLOAT)


ANS:  C                    

   59.   Your sister just started a company that provides individuals and organizations access to the Internet for a small fee. Which of the following describes her company?
a.
access provider
b.
regional broadband domain monitor
c.
wireless Internet technology disseminator
d.
broadband network gateway administrator


ANS:  A                    

   60.   What does a wireless Internet service provider do?
a.
provides wireless Internet access to desktop computers, notebook computers, and mobile devices such as smart phones
b.
provides Internet broadband access exclusively to the headquarters of large, international companies with offices around the world
c.
determines the Internet protocol for use in wireless devices
d.
builds specialized wireless antennas used in mobile devices for accessing broadband Internet signals


ANS:  A                   

   61.   The major carriers of Internet network traffic are known collectively by what term?
a.
Internet transmission link
b.
Internet system grid
c.
Internet backbone
d.
Internet complex


ANS:  C                   

   62.   What is the purpose of an Internet Protocol address (IP address)?
a.
It specifies whether a computer is using a broadband network or a direct-dial network.
b.
It differentiates between a server computer and a client computer and contains codes to identify whether the computer can send data or receive data.
c.
It contains the protocol schema used to identify whether the computer is on a wired or wireless network.
d.
It uniquely identifies each computer or device connected to the Internet.


ANS:  D                    

   63.   In Internet terminology, what is the term, www.google.com, called?
a.
domain name
b.
Internet Service Provider
c.
Web page protocol
d.
TLD


ANS:  A                    

   64.   Which of the following are valid TLDs?
a.
com, net, bmk
b.
gov, org, net
c.
mil, com, ipv
d.
www, edu, com


ANS:    B

No comments:

Post a Comment