placeholder image to represent content

Unit 2 Practice Test: The Internet

Quiz by McCartney, Callie R

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
16 questions
Show answers
  • Q1

    Which of the following items are computing devices?

    Choose all that Apply

    sorting:// Computing Devices| Cell Phone, Laptop, Router, E-Bike, Smar Watch: Not Computing Devices| Digital Image, Pen, Refrigerator

    30s
  • Q2

    What is the bandwidth of this internet connection if it can transfer 6,000 Bits in 3 seconds?

    6,000 bits per second

    9,000 bits per second

    2,000 bits per second

    3,000 bits per second

    30s
  • Q3

    Maria has several computing devices around the home that are connected to the Internet:

    ·             A smart home assistant (connected via wireless)

    ·             A laptop computer (connected via wireless)

    ·             A desktop computer (connected via Ethernet)

    ·             A deskt

    Which of her devices use the Internet Protocol (IP) address when sending data through the Internet?

    sorting:// Uses IP| A smart home assistant, A laptop computer, A desktop computer: Does not Use IP| 

    30s
  • Q4

    Which of the following best explains what happens when a new device is connected to the Internet?

    A Web site is assigned to the device.

    A packet number is assigned to the device.

    An Internet Protocol (IP) address is assigned to the device.

    A device driver is assigned to the device.

    30s
  • Q5

    A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent back to the user?

    The server attempts to connect directly to the user’s computer. If the connection is successful, the entire file is sent at once. If the connection is unsuccessful, an error message is sent to the user.

    The server repeatedly attempts to connect directly to the user’s computer until a connection is made. Once the connection is made, the entire file is sent.

    The file is broken into packets and sent over a network. The user’s browser must request each packet, in order, until all packets are received.

    The file is broken into packets and sent over a network. The packets must be reassembled by the user’s computer when they are received. If any packets are missing, the browser re-requests the missing packets.

    30s
  • Q6

    Which of the following is a benefit of the fault-tolerant nature of Internet routing?

    The ability to use multiple protocols such as hypertext transfer protocol (HTTP), Internet protocol (IP), and simple mail transfer protocol (SMTP) to transfer data.

    The ability to use a hierarchical naming system to avoid naming conflicts

    The ability to resolve errors in domain name system (DNS) lookups

    The ability to provide data transmission even when some connections between routers have failed

    30s
  • Q7

    Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes whether these two computers can communicate with each other across the Internet?

    The computers cannot communicate, because different manufacturers use different communication protocols.

    The computers can communicate, but additional hardware is needed to convert data packets from one computer’s protocol to the other computer’s protocol.

    The computers can communicate directly because Internet communication uses standard protocols that are used by all computers on the Internet.

    The computers can communicate directly only if the messages consist of text. Other formats cannot be interpreted across computers.

    30s
  • Q8

    A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet.

    Which of the following actions is

    LEAST likely

    to be effective in this purpose?

    Requiring that every school and library have assistive devices that allow people with disabilities to access computer resources

    Providing free wireless Internet connections at locations in low-income neighborhoods

    Putting helpful tips for operating computers on the city government website

    Holding basic computer classes at community centers

    30s
  • Q9

    An IPv4 address has 32 bits, so there are 232 (over 4 billion) possible IPv4 addresses. Since the Internet is gaining devices quickly, we will soon surpass 232 unique devices on the Internet.

    In anticipation of all the new Internet devices, we are in the process of switching to IPv6, which uses 128 bits for a single address. 

    Which of the following statements correctly describes how many more (how many more combinations from adding 96 bits) addresses will be possible to represent by switching from IPv4 to IPv6?

    296 times as many addresses can be represented with IPv6

    296 more addresses can be represented with IPv6

    96 more addresses can be represented with IPv6

    96 times as many addresses can be represented with IPv6

    30s
  • Q10

    Consider the following network diagram:

    Each box represents a device connected to the network, each line represents a direct connection between two devices.

    Which of the following statements are true about this network:

    I - The network is fault-tolerant. If one connection fails, any two devices can still communicate.

    II - Computers C and E need to first communicate with at least one other device in order to communicate with each other.

    Question Image

    I and II

    II only

    Neither I nor II

    I only

    30s
  • Q11

    Rank these connections fastest to slowest bandwidth

    A) 600 bits in  3 seconds

    B) 1000 bits in 2 seconds

    C) 3000 bits in 30 seconds

    C (1000 bits/sec), B (1000 bits/sec), A (600 bits/sec)

    B (500 bits/sec), C (100 bits/sec), A (20 bits/sec)

    B (500 bits/sec), A (200 bits/sec), C (100 bits/sec)

    A (300 bits/sec), C (100 bits/sec), B (50 bits/sec)

    30s
  • Q12

    The following figure represents a network of physically linked devices labeled P through S. A line between two devices indicates a connection. Devices can communicate only through the connections shown.

    Which of the following statements best explains the ability of the network to provide fault tolerance?

    Question Image

    The network is considered fault-tolerant because there are redundant paths between each pair of devices.

    The network is not considered fault-tolerant because it relies on physical connections.

    The network is considered fault-tolerant because it guarantees that no individual component will fail.

    The network is not considered fault-tolerant because it provides more paths than are needed.

    30s
  • Q13

    Which of the following best explains how data is typically assembled in packets for transmission over the Internet?

    Each packet contains an encrypted version of the data to be transmitted, along with metadata containing the key needed to decrypt the data.

    Each packet contains data to be transmitted, along with metadata containing information used for routing the data.

    Each packet contains multiple data files bundled together, along with metadata describing how to categorize each data file.

    Each packet contains only the metadata used to establish a direct connection so that the data can be transmitted.

    30s
  • Q14

    Which of the following best explains how data is transmitted on the Internet?

    All data is transmitted in a single packet through a direct connection between the sender and the recipient.

    Data is broken into packets, which can be sent along different paths, even if that path is super extra-long and round about!

    Data is broken into packets, which are all sent to the recipient in a specified order along the same path.

    Multiple data files are bundled together in a packet and transmitted together.

    30s
  • Q15

    Which of the following best explains how messages are typically transmitted over the Internet?

    The message is transmitted as a single file and received in whole by the recipient’s device.

    The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient’s device.

    The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient’s device.

    The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device.

    30s

Teachers give this quiz to your class