Chapter 10

1. Current estimates suggest that there are more than 450 million hosts (computer sites that store and deliver Web pages) connected to the Internet.
T
2. IP is a connection-oriented protocol.
F
3. Currently, almost all networks involved in the Internet use IP version 6.
F
4. The IP datagram fields Identification, Flags, and Fragment Offset are used to fragment a datagram into smaller parts.
T
5. The Time to Live field indicates how long a particular datagram is allowed to live.
T
6. A 16-bit address uniquely defines a connection to the Internet.
F
7. When the user wants to send an e-mail message, the e-mail program takes the e-mail message and passes it to the transport layer of the software.
T
8. The Window field of the TCP header cannot be set to zero.
T
9. Like its counterpart IP, TCP is a fairly streamlined protocol.
T
10. IP is the protocol used by most networks and network applications to create an error-free, end-to-end network connection.
F
11. The UDP header contains only four fields—Source Port, Destination Port, Length, and Checksum.
T
12. Every device that has a connection to the Internet is assigned an IP address.
T
13. Home and small business local area networks often use NAT to conserve IP addresses.
T
14. Using a Web browser, you can download and view Web pages on a personal computer.
T
15. The Hypertext Transfer Protocol, or HTTP, is a transport layer protocol.
F
16. Every object on the Internet has a unique English-based address called its Uniform Resource Locator (URL).
T
17. The Internet recognizes URLs directly.
F
18. All Uniform Resource Locators consist of six parts.
F
19. To make IP addresses a little easier for human beings to understand, the 32-bit binary addresses are represented by dotted decimal notation.
T
20. There are six basic forms of a classful IP address: Class A, B, C, D, E, and F.
F
21. IP multicasting suffers from a lack of security.
T
22. Standard Generalized Markup Language (SGML) is a markup language.
F
23. Most HTML tags consist of an opening tag, followed by one or more attributes, and a closing tag.
T
24. HTML pages are simple, static text documents that browsers read, interpret, and display on the screen.
T
25. POP3 is not useful if you do not have a permanent connection to a network and must dial in using a temporary Internet connection.
T
26. The File Transfer Protocol, or FTP, was one of the first services offered on the Internet.
T
27. H.323 was originally designed for TCP/IP networks.
F
28. Types of listserv software include mailserv, majordomo, and almanac.
T
29. Intranets use essentially the same hardware and software that is used by other network applications.
T
30. The Internet is a static entity.
F
1. During the late 1960s, a branch of the U.S. government titled the ____ created one of the country’s first wide area packet-switched networks.
a. Department of Defense
b. IEEE
c. Advanced Research Projects Agency (ARPA)
d. IETF
c. Advanced Research Projects Agency (ARPA)
2. In 1983, the Department of Defense broke the ARPANET into two similar networks: the original ARPANET and ____.
a. MILNET c. CampusNET
b. NSFnet d. DoDNET
a. MILNET
3. The National Science Foundation funded the creation of a new high-speed, cross-country network backbone called the ____.
a. MILNET c. CampusNET
b. NSFnet d. DoDNET
b. NSFnet
4. The ____ is the main telecommunications line through the network, connecting the major router sites across the country.
a. star topology c. mid-level network
b. ARPANET d. Backbone
d. Backbone
5. To transfer Web pages, the Internet uses the ____.
a. Telnet c. e-commerce
b. Hypertext Transfer Protocol (HTTP) d. Network Address Translation (NAT)
b. Hypertext Transfer Protocol (HTTP)
6. ____ are used to select unique documents from anywhere in the world.
a. Uniform Resource Locators (URLs) c. Dynamic Host Configuration Protocol
b. Domain Name Systems (DNSs) d. XMLs
a. Uniform Resource Locators (URLs)
7. The protocol that resides at the ____ layer in the TCP/IP protocol suite is called Internet Protocol (IP).
a. Application c. Network
b. Transport d. network access
c. Network
8. The ____ field of an IP datagram contains the version number of IP being used, just in case a new version becomes available.
a. Service Type c. Protocol
b. Time to Live d. Version
d. Version
9. The IP datagram ____ field enables the network to discard a datagram that has been traveling the Internet for too long.
a. Time to Live c. Total Length
b. Service Type d. IP Options
a. Time to Live
10. The TCP header ____ field contains a 32-bit value that counts bytes and indicates a packet’s data position within the connection.
a. Source Port c. Sequence Number
b. Padding d. Window
c. Sequence Number
11. ____ is a no-frills transport protocol that does not establish connections, does not attempt to keep data packets in sequence, and does not watch for datagrams that have existed for too long.
a. Transport Control Protocol (TCP)
b. User Datagram Protocol (UDP)
c. Internet Control Message Protocol (ICMP)
d. Network Address Translation (NAT)
b. User Datagram Protocol (UDP)
12. ____ takes an IP address in an IP datagram and translates it into the appropriate medium access control layer address for delivery on a local area network.
a. Transport Control Protocol (TCP) c. Network Address Translation (NAT)
b. User Datagram Protocol (UDP) d. Address Resolution Protocol (ARP)
d. Address Resolution Protocol (ARP)
13. ____ lets a router represent an entire local area network to the Internet as a single IP address.
a. ICMP c. ARP
b. NAT d. UDP
b. NAT
14. A ____ is a data network connection that makes use of the public telecommunications infrastructure but maintains privacy through the use of a tunneling protocol and security procedures.
a. NAT network c. DHCP
b. TCP network d. virtual private network (VPN)
d. virtual private network (VPN)
15. The Point-to-Point Tunneling Protocol (PPTP) is an extension of the Internet’s ____.
a. Internet Protocol (IP) c. Point-to-Point Protocol (PPP)
b. Transport Control Protocol (TCP) d. Address Resolution Protocol (ARP)
c. Point-to-Point Protocol (PPP)
16. ____ is a set of protocols developed by the Internet Engineering Task Force to support the secure exchange of data packets at the IP layer.
a. IPsec c. PPP
b. PPTP d. SLIP
a. IPsec
17. The Web server software accepts ____ requests from Web browsers connected to the Internet.
a. ARP c. NAT
b. DHCP d. HTTP
d. HTTP
18. A(n) ____ uniquely identifies files, Web pages, images, or any other types of electronic documents that reside on the Internet.
a. File Transfer Protocol (FTP) c. Uniform Resource Locator (URL)
b. Internet Protocol (IP) d. Domain Name Service (DNS)
c. Uniform Resource Locator (URL)
19. The ____ is a large, distributed database of Internet addresses and domain names.
a. Uniform Resource Locator (URL) b. Domain Name System (DNS)
c. Hypertext Transfer Protocol (HTTP)
d. Hypertext Markup Language (HTML)
b. Domain Name System (DNS)
20. ____ is the capability of a network server to transmit a data stream to more than one host at a time.
a. IP multicasting c. TCP broadcasting
b. TCP unicasting d. ICMP multicasting
a. IP multicasting
21. ____ is a set of codes inserted into a document that is intended for display on a Web browser.
a. Domain Name Service (DNS) c. Uniform Resource Locator (URL)
b. Hypertext Markup Language (HTML) d. Hypertext Transfer Protocol (HTTP)
b. Hypertext Markup Language (HTML)
22. ____ is a collection of newer markup tags and techniques that can be used to create more flexible and more powerful Web pages.
a. Dynamic HTML (DHTML) c. Hypertext Transfer Protocol (HTTP)
b. Address Resolution Protocol (ARP) d. Uniform Resource Locator (URL)
a. Dynamic HTML (DHTML)
23. ____ is the computerized version of writing a letter and mailing it at the local post office.
a. FTP c. e-commerce
b. e-business d. Electronic mail
d. Electronic mail
24. An e-mail program creates a(n) ____ document and attaches it to the e-mail message.
a. Multipurpose Internet Mail Extensions (MIME)
b. Address Resolution Message (ARM)
c. Transport Control Protocol (TCP)
d. Internet Protocol (IP)
a. Multipurpose Internet Mail Extensions (MIME)
25. The ____ is an Internet protocol for sending and receiving e-mail and is used to perform the transfer.
a. Address Resolution Protocol (ARP) c. File Transfer Protocol (FTP)
b. Simple Mail Transfer Protocol (SMTP) d. Transport Control Protocol (TCP)
b. Simple Mail Transfer Protocol (SMTP)
26. ____ is a client/server protocol in which e-mail is received and held for you at your Internet server.
a. Hypertext Transfer Protocol (HTTP)
b. File Transfer Protocol (FTP)
c. Domain Name Service (DNS)
d. Internet Message Access Protocol (IMAP)
d. Internet Message Access Protocol (IMAP)
27. The primary functions of ____ are to allow a user to download a file from a remote site to the user’s computer and to upload a file from the user’s computer to a remote site.
a. Hypertext Transfer Protocol (HTTP)
b. Domain Name Service (DNS)
c. File Transfer Protocol (FTP)
d. Internet Message Access Protocol (IMAP)
c. File Transfer Protocol (FTP)
28. ____ is a terminal emulation program for TCP/IP networks, such as the Internet, that allows users to log in to a remote computer.
a. Remote login c. DNS
b. ARP d. FTP
a. Remote login
29. The practice of making telephone calls over the Internet has had a number of different names, including packet voice, voice over packet, voice over the Internet, Internet telephony, and ____.
a. HTML c. Voice over IP (VoIP)
b. SMTP d. XHTML
c. Voice over IP (VoIP)
30. A company can use IP for transmission of data within its own network, but use traditional telephone lines outside the company network. Many people are now beginning to call such systems ____.
a. private VoIP c. remote VoIP
b. public VoIP d. distributed VoIP
a. private VoIP
31. ____ is actually a set of protocols named packet-based multimedia protocols, and it was designed for a wide range of applications (audio and video).
a. H.121 c. H.256
b. H.232 d. H.323
d. H.323
32. ____ is a protocol that converts telephone numbers to fully qualified domain name addresses.
a. H.323 c. SIP
b. ENUM d. UDP
b. ENUM
33. ____ involves the continuous download of a compressed audio or video file, which can then be heard or viewed on the user’s workstation.
a. Streaming audio and video c. File Transfer Protocol (FTP)
b. Voice over IP d. XML
a. Streaming audio and video
34.____ is a common application layer protocols that servers and the Internet use to deliver streaming audio and video data to a user’s browser.
a. Secure Shell (SSH) c. Real-Time Protocol (RTP)
b. Transport Control Protocol (TCP) d. Voice over IP (VoIP)
c. Real-Time Protocol (RTP)
35. Real-Time Streaming Protocol (RTSP) is a(n) ____ layer protocol.
a. physical c. transport
b. network d. application
d. application
36. ____ is the electronic selling and buying of merchandise using the Web.
a. VoIP c. E-mail
b. E-retailing d. IM
b. E-retailing
37. ____ is the gathering and use of the browsing habits of potential and current customers, which is important data for many companies.
a. Micro-marketing c. VoIP
b. E-retailing d. EDI
a. Micro-marketing
38. A ____ is data created by a Web server that is stored on the hard drive of a user’s workstation.
a. javascript c. Script
b. cookie d. Certificate
b. cookie
39. One of the biggest changes to affect the Internet will be the adoption of a new version of the Internet Protocol, version ____.
a. IPv3 c. IPv5
b. IPv4 d. IPv6
d. IPv6
40. There is a plan to implement a newer, very high-speed network that will cover the United States, interconnecting universities and research centers at transmission rates up to a gigabit per second (1000 Mbps). The new high-speed network is called ____.
a. IPv6 c. Internet2
b. FastEthernet d. Internet6
c. Internet2