BA325 – Chapter 14

internet service provider (ISP)
URL (uniform resource locator)
hypertext transfer protocol (http)
load balancing
fault tolerance
web hosting service
ICANN (internet Corporation for Assigned Names and Numbers)
hypertext markup language (HTML)
IP address
NAT (network address translation)
domain name service (DNS)
TCP (transmission control protocol)
packet (or datagram)
IP (internet protocol)
UDP (user datagram protocol)
protocol that operates instead of TCP in applications where delivery speed is important and quality can be sacrificied
voice over internet protocol (VoIP)
colocation facility
internet backbone
Amdahl’s Law
last-mile technologies
broadband (broadband Internet access)
coaxial cable (or coax)
digital subscriber line (DSL)
fiber to the home (FTTH)
wireless spectrum
_____ involves allowing voice packets to gain delivery importance over packets for applications like e-mail.
Packet prioritization
A(n) _____ is a computing device that connects networks and exchanges data between them.
The exploit referred to as __________ allowed hackers to leverage vulnerability in DNS software to redirect users to sites they did not request.
Cache poisoning
Circuit-switched networks provide connection between two parties that:
is dedicated for use by the parties for the duration of a connection.
The Internet Protocol Suite consists of the Internet Protocol and _____.
Transmission Control Protocol
Routers don’t have perfect, end-to-end information on all points in the Internet.
The acronym HFT refers to:
High Frequency Trading
The language “http” is used to create and format Web pages.
Changing the letter case when typing in host and domain names does not affect the user’s ability to reach the destination.
Peering refers to:
A situation when separate ISPs connect their networking equipment together to share traffic.
The protocol used for exchange of mail between e-mail servers across the world is called _____.
Simple Mail Transfer Protocol
The phrase ________ is used by technologists to refer to delay
The address one types into a Web browser is also known as a:
uniform resource locator.
A _____ enables communication by defining the format of data and rules for exchange.
When considering overall network speed, a system’s speed is determined by its fastest component.
The domain name service (DNS) is a distributed database that allows users to communicate with other computers by:
mapping host and domain names to IP addresses of computers.
IP addresses can oftentimes be used to identify a user’s geographic location.
Many fear that innovation might suffer as a result of the transition of Internet services from flat rate pricing to metered usage.
A(n) _____ is a temporary storage space used to speed computing tasks.
A unit of data forwarded by a network is called a _____.
Most mobile cell phone services are exempted from having to license the wireless spectrum for transmission.
When the Internet really took off, much of the Internet’s operating infrastructure transitioned to be supported by government grants rather than private firms.
DSL technology is less efficient for service providers in the United States because many of their customers live in less-densely populated suburbs and rural areas.
A technique known as _____ uses a gateway that allows multiple devices to share a single IP address. This can be useful in organizations that have a limited number of conventional IP addresses
Network Address Translation (NAT)
_____ is the insulated copper cable commonly used by cable television providers with shielding to reduce electrical interference.
Coaxial cable
A device gets its IP address from whichever organization is currently connecting it to the Internet.
In the URL, the host name is the name of the network a user tries to connect to.
_____ refers to the application transfer protocol that is used to copy files from one computer to another.
File Transfer Protocol (FTP)
_____ is the nonprofit organization responsible for managing the Internet’s domain and numbering systems.
ICANN (Internet Corporation for Assigned Names and Numbers)
_____ involves distributing a computing or networking workload across multiple systems in order to avoid congestion and slow performance.
load balancing
The TCP works at both ends of Internet communication.
Which of the following represents the correct sequence of actions taken by the TCP at the destination computer to ensure a perfect copy of the sent message is received?
Check if all sent packets are received; check if packets are damaged; request for new copies of damaged packets; put packets in correct order
Many residential providers of cable technology use a system that requires customers to share bandwidth with neighbors.
Computer programs making decisions without any human intervention conduct most U.S. stock trading.
Internet networks are _____.
packet-switched networks
_____ is the language used to compose Web pages.
Peering usually takes place at neutral sites called _____.
The User Datagram Protocol (UDP) acts as a substitute to TCP when there is a need for speed of communication, but where perfect and complete transmission quality can be sacrificed.
Which of the following is true of the term Internet backbone?
It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.
Servers or organizations do not need to be housed within a country in order to use a country code as part of their domain name.
What is an example of cybersquatting?
Acquiring a domain name to extort a firm, individual, product, or trademark holder
Which of the following applications is most likely to use UDP instead of TCP?
Web-based phone calls
____ repeatedly sends a cluster of three packets starting at the first router connected to a computer, then the next, and so on, building out the path that packets take to their destination.
One of the factors that accelerated the development of the Internet during the 1990s was:
the invention of graphical Web browsing.
TCP and IP operate above http and the other application transfer protocols.
ISPs and IXPs that carry out peering are required by the FCC to charge each other fees based on their traffic contribution.
Wall Street traders often choose a colocation facility with the goal to provide high-latency connectivity to their partners.
One of the disadvantages of cable technology is that:
systems used by many providers require customers to share bandwidth with neighbors.
Popular sites like Google and Yahoo! have several computers assigned to their host names because:
it ensures that the load of requests to their sites do not overwhelm a single computer.
Dot-com domain name registration is carried out on an auction basis to ensure the highest bidder gains rights to the desired domain name.
The Internet has no center and no one owns it.
The fault-tolerant nature of the DNS ensures that:
the service continues functioning even if one nameserver goes down.
One of the functions of the IP is to:
route message packets to the final destination.
A Web address without a file name will load content from a default page.
A firm that provides hardware and services to run Web sites of others is known as a(n) _____.
Web hosting service
The hypertext transfer protocol (http) defines the communication between:
Web browsers and Web servers.
Web browsers and Web servers
It refers to the language used to create and format Web pages.
“Html” is used to:
create and format Web pages.
Key Inc., an American guitar maker, recently lost an action to recover the domain name, claiming that the defendant infringed on its registered trademark. What did Key Inc. specifically accuse the defendant of?
Circuit-switched networks are advantageous because they offer an inexhaustible supply of bandwidth for telecommunications.
Routing protocol that is in charge of forwarding packets on the Internet is known as voice over Internet protocol.