Question: 1
Which of the following best explains what happens when a new device is connected to the Internet?



A device driver is assigned to the device.


An Internet Protocol (IP) address is assigned to the device.


A packet number is assigned to the device.


A Web site is assigned to the device.

Question: 2
According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?



about.example.com


example.com/about.html


example.com.about


example.org

Question: 3
A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent back to the user?



The file is broken into packets and sent over a network. The packets must be reassembled by the user’s computer when they are received. If any packets are missing, the browser re-requests the missing packets.


The file is broken into packets and sent over a network. The user’s browser must request each packet, in order, until all packets are received.


The server attempts to connect directly to the user’s computer. If the connection is successful, the entire file is sent at once. If the connection is unsuccessful, an error message is sent to the user.


The server repeatedly attempts to connect directly to the user’s computer until a connection is made. Once the connection is made, the entire file is sent.

Question: 4
Which of the following is a benefit of the fault-tolerant nature of Internet routing?



The ability to use a hierarchical naming system to avoid naming conflicts


The ability to resolve errors in domain name system (DNS) lookups


The ability to use multiple protocols such as hypertext transfer protocol (HTTP), Internet protocol (IP), and simple mail transfer protocol (SMTP) to transfer data.


The ability to provide data transmission even when some connections between routers have failed

Question: 5
Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes whether these two computers can communicate with each other across the Internet?



The computers cannot communicate, because different manufacturers use different communication protocols.


The computers can communicate, but additional hardware is needed to convert data packets from one computer’s protocol to the other computer’s protocol.


The computers can communicate directly only if the messages consist of text. Other formats cannot be interpreted across computers.


The computers can communicate directly because Internet communication uses standard protocols that are used by all computers on the Internet.

Question: 6
A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet.

Which of the following actions is LEAST likely to be effective in this purpose?



Holding basic computer classes at community centers


Providing free wireless Internet connections at locations in low-income neighborhoods


Putting helpful tips for operating computers on the city government website


Requiring that every school and library have assistive devices that allow people with disabilities to access computer resources

Question: 7
An IPv4 address has 32 bits, so there are 232 (over 4 billion) possible IPv4 addresses. Since the Internet is gaining devices quickly, we will soon surpass 232 unique devices on the Internet.

In anticipation of all the new Internet devices, we are in the process of switching to IPv6, which uses 128 bits for a single address. That’s 96 extra bits to represent one address!

Which of the following statements correctly describes how many more addresses will be possible to represent by switching from IPv4 to IPv6?



96 more addresses can be represented with IPv6


296 more addresses can be represented with IPv6


96 times as many addresses can be represented with IPv6


296 times as many addresses can be represented with IPv6

Question: 8
Which of the following would pose the greatest threat to a user’s personal privacy if it were to be leaked to the public?



The IP address of the user’s computer


The user’s browser cookies


The user’s email address


The user’s public key used for encryption

Question: 9
What is a Distributed Denial of Service (DDoS) attack?



An attempt by a government to deny Internet access to its citizens


An attempt to deny access to a website by flooding the website’s servers with millions of requests from different computers


An attempt by one user to deny service to another user by posting malicious material on a social network


An attempt by an Internet user to access private information stored in a private database

All Answers 1

Answered by GPT-5 mini AI
Q1: An Internet Protocol (IP) address is assigned to the device.
- New devices get an IP address so they can be routed on the Internet.

Q2: about.example.com
- That is a subdomain of example.com. (example.com/about.html is a path, not a subdomain.)

Q3: The file is broken into packets and sent over a network. The packets must be reassembled by the user’s computer when they are received. If any packets are missing, the browser re-requests the missing packets.
- Network protocols (e.g., TCP/IP) split data into packets, reassemble them, and recover missing packets.

Q4: The ability to provide data transmission even when some connections between routers have failed
- Fault-tolerant routing finds alternate paths when links or routers fail.

Q5: The computers can communicate directly because Internet communication uses standard protocols that are used by all computers on the Internet.
- Standard protocols (TCP/IP, HTTP, etc.) enable interoperability across hardware and vendors.

Q6: Putting helpful tips for operating computers on the city government website
- That’s least effective because people without access or basic skills may not reach or use the website.

Q7: 2^96 times as many addresses can be represented with IPv6 (choose the option corresponding to "296 times as many addresses")
- IPv4 = 2^32, IPv6 = 2^128, so IPv6 has 2^(128−32) = 2^96 times more addresses.

Q8: The user’s browser cookies
- Cookies can contain session tokens or other sensitive data that allow account impersonation if leaked.

Q9: An attempt to deny access to a website by flooding the website’s servers with millions of requests from different computers
- That describes a Distributed Denial of Service (DDoS) attack.