You are on page 1of 21

New Perspectives on Computer

Concepts 2013 Comprehensive 15th


Edition Parsons Test Bank
Visit to download the full and correct content document: https://testbankdeal.com/dow
nload/new-perspectives-on-computer-concepts-2013-comprehensive-15th-edition-par
sons-test-bank/
Chapter 6: The Internet

TRUE/FALSE

1. The octets in an IP address correspond to the parts of a Web site address.

ANS: F PTS: 1 REF: 305

2. All IP addresses are static.

ANS: F PTS: 1 REF: 306

3. All IP addresses are dynamic.

ANS: F PTS: 1 REF: 306

4. The www in a URL is part of a domain name.

ANS: F PTS: 1 REF: 308

5. You must pay for a domain name.

ANS: T PTS: 1 REF: 309

6. You may use an analog modem even if your phone service is digital.

ANS: T PTS: 1 REF: 313

7. With a voiceband modem, actual data transfer speeds are affected by factors such as the quality of your
phone line and connection.

ANS: T PTS: 1 REF: 313

8. Cable signals are not particularly vulnerable to environmental interference.

ANS: T PTS: 1 REF: 316

9. Most of today’s notebooks are not equipped for Wi-Fi.

ANS: F PTS: 1 REF: 322

10. You can use a hotspot for mobile Internet access.

ANS: F PTS: 1 REF: 323

11. To use portable satellite technology you must take your satellite with you.

ANS: T PTS: 1 REF: 324

12. The disadvantages of WAP-enabled devices include their high price.

ANS: F PTS: 1 REF: 325


13. Some cell phones connect to your computer and act as a wireless modem.

ANS: T PTS: 1 REF: 327

14. Cloud computing is the term given to analyzing cloud patterns and, with the help of the computer,
predicting the weather.

ANS: F PTS: 1 REF: 329

15. Cell phones that offer Wi-Fi are not capable of making VoIP calls.

ANS: F PTS: 1 REF: 332

16. FTP is a protocol used by Internet phone companies for free long distance.

ANS: F PTS: 1 REF: 335

17. P2P file sharing allows users to obtain files from other users on the Internet.

ANS: T PTS: 1 REF: 337

18. BitTorrent protocols dissect files into small chunks that might reside on different computers.

ANS: T PTS: 1 REF: 337

19. One of the most common ways of gaining unauthorized access to a network is by looking for open
ports.

ANS: T PTS: 1 REF: 340

20. Most firewall software is preconfigured to block only unnecessarily open ports targeted by hackers.

ANS: T PTS: 1 REF: 341

MODIFIED TRUE/FALSE

1. A(n) on-and-off connection can have a static or dynamic IP address. _________________________

ANS: F, always-on

PTS: 1 REF: 307

2. A domain name ends with an extension that indicates its top-level domain.
_________________________

ANS: T PTS: 1 REF: 307

3. Downstream speed is the rate of data transmitted from your computer to the Internet.
_________________________

ANS: F, Upstream
PTS: 1 REF: 310

4. Mobile Internet access allows you to easily move your access device, as in the case of
vehicle-mounted satellite dishes that can be deployed when the vehicle is parked.
_________________________

ANS: F, Portable

PTS: 1 REF: 311

5. Current dial-up technology can transport data at speeds up to 6 MB downstream for a distance of about
1.25 miles. _________________________

ANS: F, DSL

PTS: 1 REF: 314

6. DSL is digital, so data doesn't need to be changed into analog signals and then back to digital.
_________________________

ANS: T PTS: 1 REF: 315

7. Wi-Fi handoffs from one Wi-Fi network to another are clumsy and prone to packet loss.
_________________________

ANS: T PTS: 1 REF: 323

8. The big bonus of portable WiMAX is that you use the same Internet service provider whether you are
at home or on the road. _________________________

ANS: T PTS: 1 REF: 324

9. Some cell phones can act as a Wi-Fi hotspot by becoming the router for a wireless network.
_________________________

ANS: T PTS: 1 REF: 328

10. Google Apps provides a glimpse of what grid computing has to offer for productivity applications.
_________________________

ANS: F, cloud

PTS: 1 REF: 329

11. Most messaging is based on a client/server technology. _________________________

ANS: T PTS: 1 REF: 331

12. Distributed grids tap into thousands of PCs and Macs with Internet connections whose owners rent
their computer’s idle hours to a grid processing task. _________________________

ANS: F, donate

PTS: 1 REF: 334


13. In the context of networking, a(n) virus-protector is software or hardware designed to filter out
suspicious packets attempting to enter or leave a computer. _________________________

ANS: F, firewall

PTS: 1 REF: 341

14. NATs are intended to work within LANs to monitor and direct packets being transported from one
device to another. _________________________

ANS: F, Routers

PTS: 1 REF: 342

15. Setting up a secure VPN is easy. _________________________

ANS: F
difficult
hard
nontrivial

PTS: 1 REF: 345

MULTIPLE CHOICE

1. The Internet began with a project called ____.


a. NSF c. ARPANET
b. AOL d. WWW
ANS: C PTS: 1 REF: 302

2. There are estimated to be more than ____ users of the Internet.


a. 2 million c. 2 trillion
b. 2 billion d. 100 million
ANS: B PTS: 1 REF: 303

3. Network service providers include ____.


a. AT&T c. British Telecom
b. Deutsche Telekom d. all of the above
ANS: D PTS: 1 REF: 303

4. ISPs can maintain servers for ____.


a. music file sharing c. instant messaging
b. online discussions d. all of the above
ANS: D PTS: 1 REF: 304
5. The accompanying figure represents the connection of your computer to the Internet; the router
marked A should belong to a(n) ____.
a. ISP c. end user
b. NSP d. none of the above
ANS: A PTS: 1 REF: 304

6. The accompanying figure represents the connection of your computer to the Internet; the router
marked B should belong to a(n) ____.
a. ISP c. company
b. NSP d. none of the above
ANS: B PTS: 1 REF: 304

7. In the accompanying figure, C points to ____.


a. an ISP c. the Internet backbone
b. an NSP d. an Internet router
ANS: C PTS: 1 REF: 304

8. The octets in an IP address correspond to a ____.


a. network class c. network configuration
b. network location d. none of the above
ANS: A PTS: 1 REF: 305

9. Most Internet servers have an easy to remember name that is known as a(n) ____.
a. domain address c. FQDN
b. ISP d. NAP address
ANS: C PTS: 1 REF: 307
10. ____ is a valid top-level domain.
a. .ca c. .gog
b. .can d. .aol
ANS: A PTS: 1 REF: 307

11. Every domain name corresponds to a unique IP address that has been entered into the ____.
a. domain database c. name server
b. Domain Name System d. Internet Name Server
ANS: B PTS: 1 REF: 308

12. Until domain names are added to the DNS database, new sites can only be accessed by entering their
numeric ____.
a. ports c. protocols
b. domain names d. IP addresses
ANS: D PTS: 1 REF: 308

13. DNS cache ____ has been used by governments to keep citizens away from Web sites that supply
politically or culturally inflammatory information.
a. diversion c. poisoning
b. rerouting d. distraction
ANS: C PTS: 1 REF: 308

14. You need your own domain name if ____.


a. you use the Internet c. you have your own Web site
b. you have an always-on connection d. you have a router
ANS: C PTS: 1 REF: 309

15. Technical management of the Internet's Domain Name System is coordinated by ____.
a. the government c. CANN
b. ICANN d. the Internet
ANS: B PTS: 1 REF: 309

16. The elapsed time for data to make a round trip from point A to point B and back is called ____.
a. speed c. mHz
b. latency d. access time
ANS: B PTS: 1 REF: 309

17. The rate of data that is transmitted from your computer to the Internet is ____.
a. downstream speed c. download speed
b. upstream speed d. upload speed
ANS: B PTS: 1 REF: 310

18. The rate of data arriving at your computer is ____.


a. downstream speed c. download speed
b. upstream speed d. upload speed
ANS: A PTS: 1 REF: 310

19. A fixed Internet connection that uses a voiceband modem and telephone lines is a(n) ____ connection.
a. dial-up c. DSL
b. fixed d. ISDN
ANS: A PTS: 1 REF: 312

20. In the accompanying figure, the type of signal represented by A is a(n) ____.
a. digital signal c. sine signal
b. analog signal d. cosine signal
ANS: A PTS: 1 REF: 313

21. In the accompanying figure, the type of signal represented by B is a(n) ____.
a. digital signal c. sine signal
b. analog signal d. cosine signal
ANS: B PTS: 1 REF: 313

22. Digital telephone systems open up the possibilities for digital data transport options such as ____.
a. cable Internet service c. WiMAX
b. DSL d. Both B and C
ANS: B PTS: 1 REF: 313

23. ____ service offered slightly faster service than dial-up but has today been replaced by DSL.
a. ISDN c. Cable Internet
b. WiMAX d. Satellite Internet
ANS: A PTS: 1 REF: 313

24. DSL uses ____ to transmit data.


a. phone lines c. T1 lines
b. cable connections d. none of the above
ANS: A PTS: 1 REF: 314

25. A ____ is a device that connects a computer to a telephone line and converts computer data signals
into signals compatible with DSL.
a. DSL filter c. DSL modem
b. DSL converter d. DSL adapter
ANS: C PTS: 1 REF: 315

26. ____ currently offers the fastest Internet access speeds.


a. ISDN c. Satellite
b. DSL d. Cable
ANS: D PTS: 1 REF: 316

27. Cable Internet service needs ____.


a. circuitry to handle Ethernet protocols and a cable modem
b. a cable modem and router
c. Internet protocols and a cable modem
d. a cable modem and phone lines
ANS: A PTS: 1 REF: 317

28. Satellite data transport is subject to ____ delays of one second or more, which occur as your data is
routed between your computer and a satellite that orbits 22,200 miles above the Earth.
a. latency c. frequency
b. conditional d. concatenation
ANS: A PTS: 1 REF: 318

29. Satellite Internet service and TV service requires ____.


a. two satellite dishes c. two satellites dishes and two modems
b. a satellite dish and a modem d. one satellite dish and two modems
ANS: B PTS: 1 REF: 318

30. ____ wireless Internet service is designed to offer Internet access to homes and businesses by
broadcasting data signals over areas large enough to cover most cities and outlying areas.
a. Mobile c. WiFi
b. Cellular d. Fixed
ANS: D PTS: 1 REF: 319

31. An Ethernet-compatible network standard designated as IEEE 802.16 is ____.


a. WiFi c. WiMAX
b. WiLAN d. WiMAN
ANS: C PTS: 1 REF: 319

32. Portable Internet access includes all of the following EXCEPT ____.
a. WiFi c. portable WiMAX
b. portable satellite d. cellular
ANS: D PTS: 1 REF: 321

33. The ability to easily move your Internet service from one location to another is considered ____
Internet service.
a. mobile c. moving
b. portable d. cellular
ANS: B PTS: 1 REF: 321

34. ____ is an up-and-coming standard destined to be deployed by ISPs and cell phone carriers to allow
seamless handoff between one tower and another.
a. WiMAX c. Portable WiMAX
b. Mobile WiMAX d. Mobile WiFi
ANS: B PTS: 1 REF: 324

35. Data transport rates depend on the technology of the cellular system. The generation of cellular
technology associated with analog voice service is ____.
a. 1G c. 2.5G
b. 2G d. 3G
ANS: A PTS: 1 REF: 325

36. Sending computer data over a ____ system required a voiceband modem to convert digital data into
audible signals.
a. 1G c. 3G
b. 2G d. Both A and B
ANS: D PTS: 1 REF: 325

37. ____ replaced analog technology with digital technology and added support for text messages.
a. 1G c. 3G
b. 2G d. 4G
ANS: B PTS: 1 REF: 325

38. ____ technologies support digital transmission for both voice and data.
a. 1G c. 3G
b. 2G d. None of the above
ANS: C PTS: 1 REF: 325

39. 3G technologies have speeds ranging from 200 Kbps to ____.


a. 500 Kbps c. 2 Mbps
b. 1 Mbps d. 5 Mbps
ANS: D PTS: 1 REF: 325

40. Examples of 3G technologies include ____.


a. EDGE c. HSUPA
b. EV-DO d. all of the above
ANS: D PTS: 1 REF: 325

41. Interim 4G technologies such as ____ have been deployed since 2009.
a. LTE c. EV-DO
b. ITE d. none of the above
ANS: A PTS: 1 REF: 325

42. A communications protocol that provides Internet access from handheld devices is ____.
a. WAP c. HAP
b. WIP d. HIP
ANS: A PTS: 1 REF: 325

43. The disadvantage of WAP-enabled devices is their ____.


a. access speed c. portability
b. screen size d. all of the above
ANS: B PTS: 1 REF: 325

44. With ____ you can easily assemble a small network just about anywhere.
a. RF c. EVDO
b. MiFi d. All of the above
ANS: B PTS: 1 REF: 327

45. ____ computing depends on a grid of servers, storage devices, and protocols that offer
Internet-accessible computing services ranging from consumer-level media sharing to office
productivity applications and complex corporate data processing.
a. Cloud c. Ambient
b. Disperse d. Client
ANS: A PTS: 1 REF: 330

46. Most messaging is based on a(n) ____ model.


a. P2P c. LAN
b. client/server d. Internet
ANS: B PTS: 1 REF: 331

47. Messaging and chat protocols include all of the following EXCEPT ____.
a. IRC c. Jabber
b. MSNP d. Talkie
ANS: D PTS: 1 REF: 331

48. VoIP software is sometimes referred to as a(n) ____ client.


a. ISP c. HTTP
b. SIP d. none of these
ANS: B PTS: 1 REF: 331

49. VoIP systems are offered by companies such as ____.


a. AT&T c. Vonage
b. magicJack d. all of the above
ANS: D PTS: 1 REF: 331

50. To set up free VoIP, you and the people you communicate with can install free VoIP clients such as
____.
a. SysIP c. Presto
b. Blink d. none of these
ANS: B PTS: 1 REF: 332

51. The ____ protocol allows the transfer of files from one computer to another over any TCP/IP network.
a. ftp c. P2P
b. http d. GRID
ANS: A PTS: 1 REF: 335
52. The accompanying figure is a screenshot of FileZilla, in which the ____ file will go to the location
pointed to by box B.
a. downloaded c. redirected
b. uploaded d. remastered
ANS: B PTS: 1 REF: 336

53. The accompanying figure is a screenshot of FileZilla, in which the ____ of the transfer is indicated by
box C.
a. index c. progress
b. resolution d. accuracy
ANS: C PTS: 1 REF: 336

54. The accompanying figure is a screenshot of FileZilla, in which the file to be ____ is indicated by box
A.
a. uploaded c. reloaded
b. downloaded d. remastered
ANS: A PTS: 1 REF: 336

55. ____ is a file sharing protocol that distributes the role of the file server across a collection of dispersed
computers.
a. ftp c. P2P
b. http d. BitTorrent
ANS: D PTS: 1 REF: 337
56. With BitTorrent, as more computers request the file, they become part of a ____ that uses peer-to-peer
technology to exchange file pieces with each other.
a. swarm c. leech
b. seed d. choker
ANS: A PTS: 1 REF: 337

57. BitTorrent can be used to distribute ____.


a. spyware c. malicious code
b. adware d. all of the above
ANS: D PTS: 1 REF: 338

58. Network services such as the Web, ftp, and e-mail operate from ____.
a. routers c. ports
b. gateways d. portals
ANS: C PTS: 1 REF: 340

59. The use of automated software to locate computers that are vulnerable to unauthorized access is a port
____.
a. search c. dig
b. probe d. pry
ANS: B PTS: 1 REF: 340

60. The average “survival time” for an unprotected computer to remain uncompromised is only ____.
a. nine seconds c. nine hours
b. nine minutes d. nine days
ANS: B PTS: 1 REF: 340

61. Sharing files on a LAN or the Internet requires open ____.


a. ports c. sources
b. domains d. channels
ANS: A PTS: 1 REF: 342

62. ____ are intended to work within LANs to monitor and direct packets being transported from one
device to another.
a. Routers c. Filters
b. Gateways d. Firewalls
ANS: A PTS: 1 REF: 342

63. A ____ IP address is one which can be accessed by packets on the Internet.
a. static c. routable
b. dynamic d. private
ANS: C PTS: 1 REF: 343
64. The accompanying figure represents a virtual private network. In this figure, A points to ____ data.
a. encrypted c. routed
b. remote d. nonencrypted
ANS: A PTS: 1 REF: 345

65. The accompanying figure represents a virtual private network. In this figure, B points to a(n) ____.
a. corporate network c. router
b. remote access server d. ISP
ANS: C PTS: 1 REF: 345

66. The accompanying figure represents a virtual private network. In this figure, C points to a(n) ____
server.
a. unencrypted c. public
b. VPN d. channel
ANS: B PTS: 1 REF: 345

67. The accompanying figure represents a virtual private network. In this figure, D points to ____ data.
a. nonencrypted c. wireless
b. encrypted d. public
ANS: A PTS: 1 REF: 345
68. The accompanying figure represents a virtual private network. In this figure, E points to ____.
a. a server c. an Internet channel
b. the Internet d. an ISP
ANS: B PTS: 1 REF: 345

69. You can install personal VPN software such as ____.


a. WiTopia c. HotSpotVPN
b. StrongVPN d. all of the above
ANS: D PTS: 1 REF: 345

70. One important security precaution when connecting your computer to public networks is to install a(n)
____.
a. router c. office suite
b. repeater d. remote PC
ANS: A PTS: 1 REF: 345

Case-Based Critical Thinking Questions


Case 6-1

Tom is currently using dial-up for his Internet connection but he believes it is too slow for his needs
and ties up his phone line. He is looking for an alternative and has come to you for help.

71. Tom wants to know which Internet access is the fastest. You tell him ____.
a. DSL c. satellite
b. ISDN d. cable
ANS: D PTS: 1 REF: 316 TOP: Critical Thinking

72. Tom wants to know which of the services uses his existing telephone lines. You tell him ____.
a. DSL c. satellite
b. cable Internet service d. WiMAX
ANS: A PTS: 1 REF: 314 TOP: Critical Thinking

73. Tom wants to know what kind of service to opt for if cable Internet service is not available, or proves
slower or less dependable than expected. You tell him the next choice would be ____.
a. dial-up c. ISDN
b. DSL d. satellite
ANS: B PTS: 1 REF: 320 TOP: Critical Thinking

Case-Based Critical Thinking Questions


Case 6-2

Sally often travels for her business. She needs a way to access the Internet while away from home. She
has come to you for help.

74. Sometimes Sally wants to browse the Internet while sitting and enjoying a cup of coffee. She has heard
that there are some public WiFi options but she knows there are some limitations. You tell her ____.
a. they are very expensive
b. access speed is slow
c. wireless eavesdroppers can access personal info
d. all of the above
ANS: C PTS: 1 REF: 323 TOP: Critical Thinking

75. You describe WiMAX to Sally. You tell her ____.


a. you can use the same provider for home and mobile use
b. you must get a “day pass” to use WiMAX if you are outside your home
c. it is great and that there is wide coverage
d. all of the above
ANS: A PTS: 1 REF: 324 TOP: Critical Thinking

76. Another option Sally is considering is a portable satellite system. She asks you about the details and
you tell her ____.
a. a vehicle-mounted satellite dish can be deployed from a control panel inside the vehicle
b. signals can no longer be captured dependably if a fixed satellite dish moves out of
alignment
c. the challenge is to make sure the dish is correctly aimed from the location where it is used
d. all of the above
ANS: D PTS: 1 REF: 324 TOP: Critical Thinking

77. Sally has heard that cellular data service has poor quality. You tell her ____.
a. that it is always poor
b. that it is never poor
c. that it depends on the generation of technology being used
d. that it depends totally on the carrier
ANS: C PTS: 1 REF: 325 TOP: Critical Thinking

Case-Based Critical Thinking Questions


Case 6-3

Harry is concerned about Internet security. He knows very little about the subject but does know it has
been in the news a great deal lately. He needs your advice.

78. You and Harry are discussing firewalls. You explain that he has a firewall built into Windows. He says
he has one that came with his virus protection. He should ____.
a. disable both
b. use only the one that came with Windows
c. not enable the Windows firewall if his antivirus software firewall is activated
d. use both
ANS: C PTS: 1 REF: 341 TOP: Critical Thinking

79. Harry’s grandson has been coming to his house and downloading music. His grandson turned “file
sharing” on. He is concerned this causes security problems. Harry should ____.
a. deactivate it when not needed c. get an additional firewall
b. get anti-sharing software d. forget it and not worry
ANS: A PTS: 1 REF: 342 TOP: Critical Thinking

80. Harry’s daughter has a personal VPN. He has decided he wants to be current and wants one also. You
tell him ____.
a. that you will go buy one
b. that he already has one as a part of Windows
c. that he needs a specialist to install it
d. that it would provide extra security if he intends to use public Wi-Fi hotspots
ANS: D PTS: 1 REF: 345 TOP: Critical Thinking

COMPLETION

1. NSP equipment and links are tied together by ____________________.

ANS:
network access points
NAPs
network access points (NAPs)
NAPs (network access points)

PTS: 1 REF: 303

2. The Internet ____________________ is a network of high-capacity routers and fiber-optic


communications links that provides the main routes for data traffic across the Internet.

ANS: backbone

PTS: 1 REF: 303

3. A company that offers Internet access to individuals is a(n) ____________________.

ANS:
ISP
Internet Service Provider
ISP (Internet Service Provider)
Internet Service Provider (ISP)

PTS: 1 REF: 303

4. A(n) ____________________ contains circuitry that converts various data-carrying signals from your
computer to signals that can travel over various communications channels.

ANS: modem

PTS: 1 REF: 304

5. The primary protocol suite responsible for message transmission on the Internet is
____________________.

ANS:
TCP/IP
Transmission Control Protocol/Internet Protocol
TCP/IP (Transmission Control Protocol/Internet Protocol)
Transmission Control Protocol/Internet Protocol (TCP/IP)

PTS: 1 REF: 305

6. The rate of data arriving at your computer is ____________________ speed.


ANS: downstream

PTS: 1 REF: 310

7. The type of Internet access that allows you to send an e-mail from your cellphone as you ride on a
high-speed train is ____________________.

ANS: mobile

PTS: 1 REF: 311

8. A fixed Internet connection that uses a voiceband modem and telephone line to transport data is
____________________.

ANS: dial-up

PTS: 1 REF: 312

9. A high-speed, digital, always-on, Internet access technology that runs over standard phone lines is
____________________.

ANS:
DSL
Digital Subscriber Line
DSL (Digital Subscriber Line)
Digital Subscriber Line (DSL)

PTS: 1 REF: 314

10. A DSL ____________________ prevents voiceband signals from interfering with DSL signals.

ANS: filter

PTS: 1 REF: 315

11. An area in which the public can access a Wi-Fi network is called a(n) ____________________.

ANS:
hotspot
Wi-Fi hotspot

PTS: 1 REF: 322

12. A communications protocol that provides Internet access from handheld devices is called
____________________.

ANS:
WAP
Wireless Access Protocol
WAP (Wireless Access Protocol)
Wireless Access Protocol (WAP)

PTS: 1 REF: 325


13. For the “real” Internet, cellular service providers offer data services, sometimes referred to as mobile
____________________.

ANS: broadband

PTS: 1 REF: 326

14. An Internet ____________________ is a Web-based online discussion site where participants post
comments to discussion threads.

ANS: forum

PTS: 1 REF: 332

15. A(n) ____________________ is similar to an online diary that contains a series of entries on one or
more topics.

ANS:
blog
Web log

PTS: 1 REF: 333

16. A(n) ____________________ is a short message of 140 characters or less, posted to the Twitter Web
site.

ANS: tweet

PTS: 1 REF: 333

17. A computing system in which a network of computers are harnessed together to perform processing
tasks is called a(n) ____________________ computing system.

ANS: grid

PTS: 1 REF: 334

18. Any access to data or programs by hackers, criminals, or other unauthorized persons is called
____________________.

ANS: intrusion

PTS: 1 REF: 339

19. A(n) ____________________ IP address is a non-routable IP address that can be used within a LAN,
but not for Internet data transport.

ANS: private

PTS: 1 REF: 343

20. The process your router uses to keep track of packets and their corresponding private or public IP
addresses is network address ____________________.
ANS: translation

PTS: 1 REF: 343

MATCHING

Identify the letter of the choice that best matches the phrase or definition.
a. anonymous FTP g. asymmetric Internet connection
b. private IP address h. VPN
c. symmetric Internet connection i. NAP
d. static IP address j. dynamic IP address
e. Ping k. Internet backbone
f. routable IP address l. fixed wireless Internet service
1. Provides the main routes for data traffic across the Internet
2. An Internet utility that sends a signal to a specific Internet address and waits for a reply
3. Upstream and downstream speeds are the same
4. Wireless broadband service
5. Does not use a password
6. Upstream and downstream speeds are different
7. Non-routable IP address
8. Temporarily assigned address
9. Permanently assigned address
10. Tie network links together
11. Can be accessed by packets on the Internet
12. A corporate solution for Internet security

1. ANS: K PTS: 1 REF: 303


2. ANS: E PTS: 1 REF: 309
3. ANS: C PTS: 1 REF: 311
4. ANS: L PTS: 1 REF: 319
5. ANS: A PTS: 1 REF: 336
6. ANS: G PTS: 1 REF: 310
7. ANS: B PTS: 1 REF: 343
8. ANS: J PTS: 1 REF: 306
9. ANS: D PTS: 1 REF: 306
10. ANS: I PTS: 1 REF: 303
11. ANS: F PTS: 1 REF: 343
12. ANS: H PTS: 1 REF: 345

ESSAY

1. Explain the difference between portable Internet access and mobile Internet access.

ANS:
Portable Internet access is defined as the ability to easily move your Internet service from one location
to another. The required device is light and compact enough to easily carry. However, you must
remain in one location while you use the service.
Mobile Internet access offers a continuous Internet connection as you are walking or riding in a bus,
car, train, or plane. It is very similar in concept to cellular phone service that allows you to move freely
within the coverage area as it seamlessly hands off your signal from one tower to the next. Mobile
Internet access includes Wi-Fi, mobile WiMAX, and cellular broadband service.

PTS: 1 REF: 321 TOP: Critical Thinking

2. Explain what VoIP is and how it works.

ANS:
VoIP (Voice over Internet Protocol), or Voice over IP, is a technology in which a broadband Internet
connection is used to place telephone calls instead of the regular phone system. It is based on SIP
(Session Initiation Protocol), so VoIP software is sometimes referred to as a SIP client. The earliest
VoIP connections were computer-to-computer connections. Both the person initiating the call and the
person receiving the call had to have computers with microphones and headsets or speakers. You
could only call people who were using the same VoIP software and who happened to be online when
you wanted to call them. These early VoIP systems worked more like instant messaging with voice
than a traditional phone call. You can still use VoIP to make calls from one computer to another, but
today’s VoIP systems allow you to use a standard telephone handset to make or receive calls. They
also allow you to receive calls from land line telephones and to place calls to these telephones.

Today’s VoIP systems convert voice communications to data packets. An IP address is attached to
each packet. If you are calling a friend with computer-based VoIP, for example, your friend’s IP
address will be attached to the packets. If you are calling a land line or other destination without its
own IP address, your VoIP packets will carry an IP address of a service that can route your packets to
their destination using land lines where necessary.

PTS: 1 REF: 331-332 TOP: Critical Thinking

3. Explain what BitTorrent is and how it works.

ANS:
BitTorrent is a file sharing protocol that distributes the role of file server across a collection of
dispersed computers. BitTorrent is, in some sense, an offshoot of grid computing concepts, in which an
ad-hoc collection of personal computers located anywhere on the Internet can cooperate to complete a
task normally handled by monolithic servers or supercomputers.

A BitTorrent network is designed to reduce the bandwidth bottleneck that occurs when many people
attempt to download the same very large file, such as a feature-length film, application software, or an
interactive 3-D computer game.

Suppose that 100 computers request a film at about the same time. A server breaks the movie file into
pieces and begins to download those pieces to the first computer that requested the movie. As more
computers request the file, they become part of a “swarm” that uses peer-to-peer technology to
exchange file pieces with each other. After the server has downloaded all the file pieces to the swarm,
its job is complete and it can service other requests. The swarm continues to exchange file pieces until
every computer in the swarm has the entire file.

PTS: 1 REF: 337 TOP: Critical Thinking

You might also like