During which period of time did the Institutionalization phase of Internet development take place?
1950-1960
1961-1974
1975-1995
1995-through the present
Which of the following occurred during the Commercialization phase of Internet development?
The fundamental building blocks of the Internet were realized in actual hardware and software.
Large mainframes on different college campuses were linked.
The Domain Name System was introduced.
NSF privatized the operation of the Internet's backbone.
During which phase of the development of the Internet was Ethernet invented?
Commercialization phase
Institutional phase
Innovation phase
Consolidation phase
Which of the following is not one of the basic technological foundations of the Internet?
client/server computing
Tracert
TCP/IP communications protocol
packet-switching hardware
The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:
routing.
the Transmission Control Protocol.
packet switching.
the File Transfer Protocol.
Which of the following is the core communications protocol for the Internet?
Telnet
FTP
TCP/IP
SSL
The Transport Layer of TCP/IP is responsible for which of the following?
placing packets on and receiving them from the network medium
addressing, packaging, and routing messages
providing communication with the application by acknowledging and sequencing the packets to and from the application
providing a variety of applications with the ability to access the services of the lower layers
The Internet Layer of TCP/IP is responsible for which of the following?
Which of the following allows users to communicate visually and aurally in real-time, and uses high-resolution monitors to simulate the presence of participants?
telepresence
videoconferencing
VOIP
IP telephony
An IPv4 address is expressed as a:
32-bit number that appears as a series of four separate numbers separated by semicolons.
64-bit number that appears as a series of four separate numbers separated by semicolons.
64-bit number that appears as a series of four separate numbers separated by periods.
32-bit number that appears as a series of four separate numbers separated by periods.
The natural language convention used to represent IP addresses is called the:
uniform resource locator system.
Internet protocol addressing schema.
domain name system.
assigned numbers and names (ANN) system.
The addresses used by browsers to identify the location of content on the Web are called:
domain names.
uniform resource locators.
IP addresses.
file paths.
Which of the following statements about client/server computing is true?
It exploded the available communications capacity.
It provided communication rules and regulations.
It connects multiple powerful personal computers together in one network with one or more servers dedicated to common functions that they all need.
It does not provide sufficient computing capacity to support graphics or color.
Which of the following is not an advantage of client/server computing over centralized mainframe computing?
It is easy to expand capacity by adding servers and clients.
Each client added to the network increases the network's overall capacity and transmission speeds.
Client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer.
There is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down.
________ is a model of computing in which firms and individuals obtain computing power and software applications over the Internet, rather than purchasing and installing it on their own computers.
Client/server computing
P2P computing
Mobile computing
Cloud computing
Which of the following protocols is used to send mail to a server?
SMTP
HTTP
Where does TSL operate within TCP/IP?
between the Internet Layer and the Transport Layer
between the Transport Layer and the Application Layer
between the Network Interface Layer and the Transport Layer
between the Internet Layer and the Application Layer
A(n) ________ is an audio presentation stored as an audio file and posted to the Web for users to download.
podcast
RSS subscription
weblog
widget
________ is one of the original Internet services and is used to transfer files from a server computer to a client computer and vice versa.
________ is a utility program that allows you to check the connection between your client and a TCP/IP network.
Ping
Finger
Which layer of Internet architecture is composed of the telecommunications networks and protocols?
Network Technology Substrate layer
Middleware Services layer
Transport Services and Representation Standards layer
Applications layer
TCP/IP operates in which layer of Internet architecture?
An Internet-enabled media player would run in which layer of Internet architecture?
The layer of Internet architecture that ties the applications to the communications network and includes such services as security and authentication is called the:
Network Technology Substrate layer.
Middleware Services layer.
Transport Services and Representation Standards layer.
Applications layer.
The backbone of the Internet is formed by:
Internet Exchange Points (IXPs).
) Network Service Providers (NSPs).
Internet Service Providers (ISPs).
Metropolitan Area Exchanges (MAEs).
When talking about the physical elements of the Internet, the term redundancy refers to:
transmitting multiple copies of a single packet to safeguard against data loss.
the use of tiered high-speed switching computers to connect the backbone to regional and local networks.
delays in messages caused by the uneven flow of information through the network.
multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.
The "hubs" where the backbone owners connect with one another are called:
Network Service Providers (NSPs).
Metropolitan Access Points (MAPs).
Local area networks that operate within a single organization that leases access to the Web directly from regional and national carriers are called:
wide area networks.
extranets.
campus area networks.
private exchanges.
The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices.
Internet Engineering Steering Group (IESG)
World Wide Web Consortium (W3C)
Internet Engineering Task Force (IETF)
Internet Society (ISOC)
The ________ helps define the overall structure of the Internet.
IAB
IESG
W3C
ITU
Which of the following is not a limitation of the current Internet?
HTML, which is not proficient for designing business documents or databases for Web viewing
limited bandwidth, which causes congestion and cannot adequately handle video and voice traffic
architectural restrictions, which stipulate that numerous requests for the same file must each be answered individually, slowing network performance
the difficulty in expanding capacity by adding servers and clients
Which of the following is not true about the mobile platform?
Most smartphones use Intel chips.
The number of cell phones worldwide exceeds the number of PCs.
About 25% of the world's cell phones are smartphones.
Unlike PCs, smartphones do not need fans.
Which of the following statements about fiber-optic cable is not true?
It consists of twelve or sixteen strands of glass.
It is thinner and lighter than coaxial or twisted pair cable.
It enables better data security than coaxial cable.
There are thousands of miles of installed fiber-optic cable in the United States that are not being used.
In the United States, there are two main types of cellular networks, CDMA and:
GSM
Bluetooth.
wireless.
WiMAX.
Which of the following is the "killer app" of 2012?
social networks
blogs
tablet PCs
search engines
The major technologies used with wireless local area networks are:
Wi-Fi and Bluetooth.
Wi-Fi and WiMAX.
Bluetooth and 3G.
WiMAX and 3G.
Which of the following is a short-range, low-power, wireless network technology useful for remotely controlling industrial, medical, and home automation devices?
Wi-Fi
WiMAX
UWB
ZigBee
Which of the following is a high-speed, medium-range, broadband wireless metropolitan area network?
Bluetooth
Siri is a type of:
intelligent personal assistant.
widget.
gadget.
social network.
The first Web browser to make it possible to view documents on the Web with colored background, images, and animations was:
Netscape Navigator.
Mosaic.
Mozilla.
Internet Explorer.
In the address http://www.company.com/clients.html, which of the following is the top-level domain?
.com
company.com
www
http
You could expect to find all of the following services in a Web server software package except:
security services.
FTP.
data capture.
an RSS aggregator.
Which of the following is currently the most popular Web browser?
Internet Explorer
Netscape
Safari
Firefox
The concept behind document formatting had its roots in which of the following?
XML
SGML
HTML
GML
Which of the following is a Web application that enables Internet users to communicate with each other, although not in real time?
online chat
online forum
IM
VoIP
Which of the following is a Web 2.0 service or application?
wikis
e-mail
online forums
A(n) ________ is a Web application that allows users to easily add and edit content on a Web page.
wiki
blog
RSS feed
The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called:
VoIP.
IPTP.
VTP.
IP.
Which of the following was the largest source of mobile commerce revenue in 2012?
mobile advertising
location-based services
e-book sales
mobile retail purchases
All of the following are true about iPhone apps except:
They are distributed through Apple's App Store.
They are typically written in the Java programming language.
They were estimated to generate over $2 billion in 2012.
More than 30 billion have been downloaded.