Term
Which statement best characterizes the relationship between the Internet and the Web?
A. The Internet and the Web are two different names for the same thing.
B. The Internet is a Web application, developed after the Web.
C. The Web is an Internet application, developed after the Internet.
D. The Internet and the Web are completely independent of each other.
|
|
Definition
|
|
Term
Which of the following is a consequence of Internet design?
A. The Internet is secure, since it incorporates strong encryption.
B. The Internet is robust, since there is no single point of failure.
C. The Internet is profitable, since it generates licensing income.
D. The Internet is free, since it is owned by the government. |
|
Definition
|
|
Term
On a packet-switched network, files and e-mail messages are broken down into small pieces, called ____.
A. messages
B. envelopes
C. circuits
D. packets |
|
Definition
|
|
Term
If there were approximately 1 billion computers in the world, about how many IP addresses could theoretically be assigned to each using an IPv4 addressing scheme?
A. 20
B. 4
C. 100
D. 500
|
|
Definition
|
|
Term
The Internet Protocol (IP) is responsible for
A. establishing a secure connection between hosts
B. sending packets of data from host to host
C. controlling the flow of data to avoid overflows
D. checking the integrity of data that has been received
|
|
Definition
|
|
Term
A number of stopgap techniques has been devised to stretch the supply of IP addresses. One of the most popular techniques is ____.
A. subnetting
B. subletting
C. subIPing
D. piconetting
|
|
Definition
|
|
Term
IPv6 uses a(n) ____ address space.
A. 32-bit
B. 56-bit
C. 128-bit
D. 256-bit |
|
Definition
|
|
Term
A single HTTP transaction consists of the following messages
A. request, response
B. request, acknowledgement, response, receipt
C. request, acknowledgement, receipt
D. inquiry, acknowledgement, request, receipt |
|
Definition
|
|
Term
In the URL "http://www.nps.edu:80", the segment " www.nps.edu " is called the
A. protocol
B. scheme
C. domain name
D. address header |
|
Definition
|
|
Term
When a web client receives a 5xx response code, the server is indicating that
A. the resource is no longer available
B. the server is having a problem
C. the requested resource has moved
D. everything is OK and the resource will follow |
|
Definition
|
|
Term
The first header in an HTTP request to obtain the document "about.html" would be
A. HEAD about.html HTTP
B. GET about.html HTTP/1.1
C. GET about html
D. REQUEST about HTML/1.1 |
|
Definition
|
|
Term
Which is the defining feature of a client-server architecture?
A. System software consists of web browsers and web servers.
B. The application software is replicated across each end-user platform.
C. Each component either makes requests or satisfies requests.
D. There is a single centralized server that handles all computation. |
|
Definition
|
|
Term
The purpose of a(n) ____ is to respond to requests for Web pages from Web clients.
A. URL
B. e-mail
C. Web server
D. top-level domain |
|
Definition
|
|
Term
A workstation can act as both a client and a server in a client/server architecture
A. True
B. False
|
|
Definition
|
|
Term
Which of the following is not an Internet application service:
A. Email
B. Telnet
C. TCP/IP
D. FTP |
|
Definition
|
|
Term
A health clinic web site supports typically about two hundred concurrent users, including patients looking for information and staff members entering and retrieving medical data. Which architecture would be best for this system?
A. Two-tier architecture
B. Three-tier architecture
C. Multi-Tier architecture
D. N-Tier architecture
|
|
Definition
|
|
Term
A legal services office uses a web-based caseload management system for staff members to track the progress of active cases. The system typically supports about 15 concurrent sessions.
Which architecture would be best for this system?
A. Two-tier architecture
B. Three-tier architecture
C. Multi-Tier architecture
D. N-Tier architecture |
|
Definition
|
|
Term
A(n) ____ is an interconnected network, usually one that uses the TCP/IP protocol set, and does not extend beyond the organization that created it.
A. Internet
B. Extranet
C. Intranet
D. ARPANET |
|
Definition
|
|
Term
An extranet that uses public networks and their protocols to send sensitive data to partners, customers, suppliers, and employees using a system called IP tunneling or encapsulation is known as a(n) ____.
A. public network
B. virtual public network
C. virtual private network
D. private network |
|
Definition
|
|
Term
The amount of data that can travel through a communication channel per unit of time is called ____.
A. throughput
B. bandwidth
C. data rate
D. capacity |
|
Definition
|
|