
Unit 2 Practice Test: The Internet
Quiz by McCartney, Callie R
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
Which of the following items are computing devices?
Choose all that Apply
sorting:// Computing Devices| Cell Phone, Laptop, Router, E-Bike, Smar Watch: Not Computing Devices| Digital Image, Pen, Refrigerator
30s - Q2
What is the bandwidth of this internet connection if it can transfer 6,000 Bits in 3 seconds?
6,000 bits per second
9,000 bits per second
2,000 bits per second
3,000 bits per second
30s - Q3
Maria has several computing devices around the home that are connected to the Internet:
· A smart home assistant (connected via wireless)
· A laptop computer (connected via wireless)
· A desktop computer (connected via Ethernet)
· A deskt
Which of her devices use the Internet Protocol (IP) address when sending data through the Internet?
sorting:// Uses IP| A smart home assistant, A laptop computer, A desktop computer: Does not Use IP|
30s - Q4
Which of the following best explains what happens when a new device is connected to the Internet?
A Web site is assigned to the device.
A packet number is assigned to the device.
An Internet Protocol (IP) address is assigned to the device.
A device driver is assigned to the device.
30s - Q5
A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent back to the user?
The server attempts to connect directly to the user’s computer. If the connection is successful, the entire file is sent at once. If the connection is unsuccessful, an error message is sent to the user.
The server repeatedly attempts to connect directly to the user’s computer until a connection is made. Once the connection is made, the entire file is sent.
The file is broken into packets and sent over a network. The user’s browser must request each packet, in order, until all packets are received.
The file is broken into packets and sent over a network. The packets must be reassembled by the user’s computer when they are received. If any packets are missing, the browser re-requests the missing packets.
30s - Q6
Which of the following is a benefit of the fault-tolerant nature of Internet routing?
The ability to use multiple protocols such as hypertext transfer protocol (HTTP), Internet protocol (IP), and simple mail transfer protocol (SMTP) to transfer data.
The ability to use a hierarchical naming system to avoid naming conflicts
The ability to resolve errors in domain name system (DNS) lookups
The ability to provide data transmission even when some connections between routers have failed
30s - Q7
Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes whether these two computers can communicate with each other across the Internet?
The computers cannot communicate, because different manufacturers use different communication protocols.
The computers can communicate, but additional hardware is needed to convert data packets from one computer’s protocol to the other computer’s protocol.
The computers can communicate directly because Internet communication uses standard protocols that are used by all computers on the Internet.
The computers can communicate directly only if the messages consist of text. Other formats cannot be interpreted across computers.
30s - Q8
A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet.
Which of the following actions is
LEAST likely
to be effective in this purpose?
Requiring that every school and library have assistive devices that allow people with disabilities to access computer resources
Providing free wireless Internet connections at locations in low-income neighborhoods
Putting helpful tips for operating computers on the city government website
Holding basic computer classes at community centers
30s - Q9
An IPv4 address has 32 bits, so there are 232 (over 4 billion) possible IPv4 addresses. Since the Internet is gaining devices quickly, we will soon surpass 232 unique devices on the Internet.
In anticipation of all the new Internet devices, we are in the process of switching to IPv6, which uses 128 bits for a single address.
Which of the following statements correctly describes how many more (how many more combinations from adding 96 bits) addresses will be possible to represent by switching from IPv4 to IPv6?
296 times as many addresses can be represented with IPv6
296 more addresses can be represented with IPv6
96 more addresses can be represented with IPv6
96 times as many addresses can be represented with IPv6
30s - Q10
Consider the following network diagram:
Each box represents a device connected to the network, each line represents a direct connection between two devices.
Which of the following statements are true about this network:
I - The network is fault-tolerant. If one connection fails, any two devices can still communicate.
II - Computers C and E need to first communicate with at least one other device in order to communicate with each other.
I and II
II only
Neither I nor II
I only
30s - Q11
Rank these connections fastest to slowest bandwidth
A) 600 bits in 3 seconds
B) 1000 bits in 2 seconds
C) 3000 bits in 30 seconds
C (1000 bits/sec), B (1000 bits/sec), A (600 bits/sec)
B (500 bits/sec), C (100 bits/sec), A (20 bits/sec)
B (500 bits/sec), A (200 bits/sec), C (100 bits/sec)
A (300 bits/sec), C (100 bits/sec), B (50 bits/sec)
30s - Q12
The following figure represents a network of physically linked devices labeled P through S. A line between two devices indicates a connection. Devices can communicate only through the connections shown.
Which of the following statements best explains the ability of the network to provide fault tolerance?
The network is considered fault-tolerant because there are redundant paths between each pair of devices.
The network is not considered fault-tolerant because it relies on physical connections.
The network is considered fault-tolerant because it guarantees that no individual component will fail.
The network is not considered fault-tolerant because it provides more paths than are needed.
30s - Q13
Which of the following best explains how data is typically assembled in packets for transmission over the Internet?
Each packet contains an encrypted version of the data to be transmitted, along with metadata containing the key needed to decrypt the data.
Each packet contains data to be transmitted, along with metadata containing information used for routing the data.
Each packet contains multiple data files bundled together, along with metadata describing how to categorize each data file.
Each packet contains only the metadata used to establish a direct connection so that the data can be transmitted.
30s - Q14
Which of the following best explains how data is transmitted on the Internet?
All data is transmitted in a single packet through a direct connection between the sender and the recipient.
Data is broken into packets, which can be sent along different paths, even if that path is super extra-long and round about!
Data is broken into packets, which are all sent to the recipient in a specified order along the same path.
Multiple data files are bundled together in a packet and transmitted together.
30s - Q15
Which of the following best explains how messages are typically transmitted over the Internet?
The message is transmitted as a single file and received in whole by the recipient’s device.
The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient’s device.
The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient’s device.
The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device.
30s