What is the relationship between the Internet and the World Wide web quizlet?

The following procedures are available for string manipulation.

Procedure Call
substring(str, start, end)
concat(str1, str2)
len(str)
Explanation
Returns a substring of consecutive characters of str starting with the character at position start and ending with the character at position end. The first character of str is considered position 1. For example, substring("delivery", 3, 6) returns "live".

Returns a single string consisting of str1 followed by str2. For example, concat("key", "board") returns "keyboard".

Returns the number of characters in str. For example, len("key") returns 3.

A programmer wants to create a new string by removing the character in position n of the string oldStr. For example, if oldStr is "best" and n is 3, then the new string should be "bet". Assume that 1 < n < len(oldStr).

Which of the following code segments can be used to create the desired new string and store it in newStr ?
Select TWO answers.

Recommended textbook solutions

What is the relationship between the Internet and the World Wide web quizlet?

Introduction to Algorithms

3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

726 solutions

What is the relationship between the Internet and the World Wide web quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

What is the relationship between the Internet and the World Wide web quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

What is the relationship between the Internet and the World Wide web quizlet?

Introduction to the Theory of Computation

3rd EditionMichael Sipser

389 solutions

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (59)

A video-streaming Web site uses 32-bit integers to count the number of times each video has been played. In anticipation of some videos being played more times than can be represented with 32 bits, the Web site is planning to change to 64-bit integers for the counter. Which of the following best describes the result of using 64-bit integers instead of 32-bit integers?

2^32 times as many values can be represented.

Which of the following can be represented by a single binary digit? Select two answers.

-The remainder when dividing a whole number by 2
-The value of a Boolean variable

The figure below represents a network of physically linked computers labeled A through G. A line between two computers indicates that the computers can communicate directly with each other, Any information sent between two computers that are not directly connected must go through at least one other computer. For example, information can be sent directly between computers A and B, but information sent between computers A and C must go through other computers.

3

Which of the following statements about security in the network is true?
I. Computers A and D need to communicate with at least two additional computers in the network in order to communicate with each other.
II. Computers B and C can communicate with each other without additional computers being aware of the communication.

II only

Why was IPv6 introduced as the new version of the Internet Protocol?

With only 32 bit IP addresses, the older version could not support the large number of devices connecting to the internet.

Which of the following best explains what happens when a new device is connected to the Internet?

An Internet Protocol (IP) address is assigned to the device.

Which of the following are ways that the Internet has changed the way people collaborate? Select TWO answers.

-Video Conferencing software enables people to talk to co-worker's and friends.
-Cloud Computing allows people to work on the same document from different areas of the World.

Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes the ability of the two computers to communicate with each other across the Internet?

The computers can communicate directly because Internet communication uses standard protocols.

Which of the following identifies a device using the internet?

An IP address

ASCII is a character-encoding scheme that uses 7 bits to represent each character. The decimal (base 10) values 65 through 90 represent the capital letters. A through Z, as shown in the table below. What ASCII character is represented by the binary (base 2) number 1001010 ?

J

How are protocols like HTTP, TCP, and IP created?

A worldwide group of volunteers draft revise, and publish protocols.

Why is the Domain Name System useful?

Domain names are easier for people to remember than the IP addresses of frequently visited websites.

Which of the following statements are true of the standards of the internet? Select TWO answers.

-Internet standards ensure that hardware and software created by different companies will be able to communicate with each other online.
-Internet standards are specific procedures and rules that are created in order to benefit the Internet Community.

The Internet Engineering Task Force makes decisions by rough consensus, not by the majority of votes. What does this ensure about the Internet?

Although the standards that govern the Internet (like HTTP and DNS) might change, they will not be affected by a small group or party.

The new version of the Internet Protocol, IPv6, allows for IP addresses that are 128 bits long, How many possible IP addresses are available with IPv6?

2^128

Which of the following statements are true of the Internet Engineering Task Force (IETF)? Select TWO ANSWERS.

-The most important work of the IETF is to create and maintain protocols like HTTP and TCP.
-The IETF is completely made up of volunteers from all over the world who do not need to attend meetings in person to participate.

Which of the following statements is true regarding the networks that make up the Internet? Select TWO answers.

-Different types of networks can be connected in order to transfer data and communicate.
-All devices that are connected on a network use the same protocol.

Which of the following statements about packets is TRUE?

None of these Statements are true.

Which of the following statements about redundancy on the Internet are TRUE? Select TWO answers.

-Redundancy has good qualities; if several routers fail, data can still be transferred.
-Redundancy has good qualities; many devices can be added to the network without affecting traffic.

Which of the following statements are TRUE of the Internet? Select TWO ANSWERS.

-Most network routing on the Internet is hierarchical.
-Most data can follow more than one path to the destination device.

Which of the following statements is an accurate interpretation of bandwidth speed?

The rate at which data is downloaded in a set amount of time.

Tom sends Troy an email, Which of the following statements about the way the email sent is NOT true?

The packets arrive at Troy's computer in the correct order so that they can be reassembled correctly.

Desktop computers, laptops, tablets, smartphones, and other devices are made by different companies, yet they are all able to access the Internet. This has led to the widespread use of the Internet from many different kinds of devices. Which of the following makes this possible?

Open standards and protocols

Which of the following is an example of a subdomain of college.org to the domain name system (DNS)?

contact.college.org

What is the primary reason that routing on the internet is redundant?

Networks are still available in case of a path rоuter failure.

Which of the following statements about TCP/IP is FALSE?

TCP/IP are the only protocols necessary to send and receive information over the Internet.

Which of the following statements about packets is FALSE?

The packet does not contain information about the sender's IP address.

Many networks are set up using a hierarchical architecture to create a "backbone" network. In this system, several connected routers act as the backbone, and many smaller LANs are connected to the backbone. This is much different than having a system where every router is connected to every other router. What are the benefits of the hierarchical approach to setting up a network? Select TWO answers.

-It makes the process of transferring data much more efficient.
-It decreases congestion in the network.

Which of the following best describes the basic idea of fault tolerance?

If part of the system fails, the operation continues without interruption.

Which of the following best explains how messages are typically transmitted over the Internet?

The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device.

Which of the following domain names are part of the same top tier? Select TWO ANSWERS

-www.collegeA.edu
-www.collegeB.edu

New websites are being created every day, yet internet users are still able to navigate the web and access information at the same speed. Which of the following most makes this possible:

Hierarchical DNS

A new device is given as IP address and added to a network so that it can access the Internet. Large amounts of files are uploaded and downloaded on this new device, but other users who were already online do not experience any difference in performance. Which of the following enables this phenomenon?

Redundant routers

The figure below represents a network of physically linked computers labeled A though F. Computers with a line between them can communicate directly to each other and if two computers do not have a line connecting them, they must go through at least one other computer to communicate with each other.
For example, information can be sent directly between B and E, but the information sent between computers B and C must fo through other computers. What is the minimum number of connections that must be broken or removed in the network before computer E and B can no longer communicate?

2

Which of the following statements is TRUE regarding Internet protocols?

All of the above are false.

Which of the following is a primary reason for the use of open protocols on the Internet?

Open protocols provide a way to standardize data transmission between different devices.

Choose the correct answer.

II only

Each packet being routed around the internet contains header information about the packet itself, and it also contains part of the file being transferred. Imagine you are sending an image of a basketball player from computer A to computer B across the Internet. Of the following, which information would be contained in each packet's header? Select TWO.

-The IP address of the destination computer.
-The sequence number of the packet in relation to all other packets of the image.

Which of the following best describes the relationship between the World Wide Web and the Internet?

The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet.

How does the hierarchical architecture of the DNS help the system scale?

Domain names have set structure, making them easy to organize and manage.

You have a coordinate grid that is 96 x 96. Assuming that you encode the x and y coordinate as separate numbers, what is the minimum number of bits that you will need to encode a coordinate in that space?

14

What is the largest binary number you can write given you have four bits? Convert this to decimal (base ten).

15

How many bits are necessary to convert 128 from decimal (base ten) to binary (base two)?

8

Two students are sending messages to one another using a 5-bit protocol. They decide to modify their protocol to 7-bit messages. How many move values can be represented in a 7-bit message than a 5-bit message?

4 times as many

The Internet Engineering Task Force makes decisions by rough consensus, not by the majority of votes. What does this ensure about the Internet?

Although the standards that govern the Internet (like HTTP and DNS) might change, they will not be affected by a small group or party.

A digital certificate is an attachment to an electronic message used for security purposes. The most common use of a digital certificate is to verify that a user sending a message is who he or she claims to be. and to provide the receiver with the means to encode a reply. provides the receiver with the means to encode a reply. Is a protocol seldom used by internet users because it requires too many layers. Is given upon completion of a digital training class. Select TWO answers.

-Is an attachment to an electronic message used for security purposes.
-The most common use of a digital certificate is to verify that a user sending a message is who he or she claims to be. and to provide the receiver with the means to encode a reply.

Which of the following do HTTPS and SSL procedures ensure? Select TWO ANSWERS.

-That messages being sent are encrypted and thus secure.
-That the identity of the server involved in an interaction can be trusted.

Digital certificates are issued by ...?

A certified instructor by Certification Authorities (CA). Like a central trusted body is used to issue driving licenses or passports, a CA fulfill the role of the Trusted Third Party by accepting Certificate applications from entities, authenticating applications, issuing Certificates and maintaining status information about the Certificates issued.

TCP/IP does all of the below EXCEPT:

choose the path needed (which routers) to move a message from point A to point B

If the post office delivered mail exactly like the routers deliver messages on the Internet, which of the following statements would be true? SELECT 2 ANSWERS

-Letters would be written on the outside of the envelope for all to read instead of letters put inside envelopes
-The mailman would sometimes take a different path to deliver each letter to your home

The Internet, A Mobile Hotspot, School Computer Lab are examples of what?

IP

The _____________ takes inventory of all packets in the datastream to ensure they are successfully sent and received.

TCP

Which of the following refers to chunks of data and their metadata, used to route and reassemble information on the Internet ?

Packets

Which term refers to the way in which information travels on the Internet, not as a single piece but in chunks?

datastreams

Which of the following terms can be described as sending all packets without checking whether they were received or ordered properly?

UDP

Choose the two statements that best describe the relationship between HTTP and the World Wide Web.

-The World Wide Web is a collection of pages and files that is shared between computers using HTTP.
-HTTP and the World Wide Web both rely on other layers of protocols for sending information on the Internet

Which of the following is the best description of the term Net Neutrality?

It is the principle that Internet service providers (ISPs) must treat all Internet communications equally, and not discriminate or charge differently based on user, content, website, platform, application, type of equipment, source address, destination address, or method of communication.

Which of the following is the best description of the term Internet censorship ?

It is the control or suppression of what can be accessed, published, or viewed on the Internet enacted by regulators, or on their own initiative. Individuals and organizations may engage in self-censorship for moral, religious, or business reasons, to conform to societal norms, due to intimidation, or out of fear of legal or other consequences

Which of the following is the best description of the term Digital Divide?

It is the growing gap between the underprivileged members of society, especially the poor, rural, elderly, and handicapped portion of the population who do not have access to computers or the internet; and the wealthy, middle-class, and young Americans living in urban and suburban areas who have access.

Students also viewed

AP Computer science

23 terms

mgrieco22

AP Computer Science Midterm

56 terms

Shyleshh_G

Compsci Unit 2

124 terms

zach_raphael7Plus

HM 4/5/21

20 terms

Kva10

Sets found in the same folder

Compsci Unit 2

124 terms

zach_raphael7Plus

AP-CSP

20 terms

Joseph457777

AP computer Science

36 terms

Jenna_Vivo6

Unit test 1,2,3

28 terms

MARTIN_URUETA

Other sets by this creator

Spanish Transitional Expressions

15 terms

kelly1kim

AHHHHHHH (calc bc)

44 terms

kelly1kim

ap csp vocab

73 terms

kelly1kim

ap lang terms #6

5 terms

kelly1kim

Verified questions

biology

Explain how your body uses chemical energy during exercise.

Verified answer

physics

The mass of a carbon nucleus is approximately 12 times the mass of a neutron. $(a)$ Use the results of Problem 112 to show that after $N$ head-on collisions of a neutron with carbon nuclei at rest, the kinetic energy of the neutron is approximately $0.716^N K_0$, where $K_0$ is its initial kinetic energy.

Verified answer

environmental science

Explain how a population of insects could become resistant to a pesticide.

Verified answer

computer science

How many integers modulo $11^{3}$ have inverses? (Note: $11^{3}=1331.)$

Verified answer

Recommended textbook solutions

What is the relationship between the Internet and the World Wide web quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

What is the relationship between the Internet and the World Wide web quizlet?

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

What is the relationship between the Internet and the World Wide web quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

What is the relationship between the Internet and the World Wide web quizlet?

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

Other Quizlet sets

Unit 2: Chapter 2

59 terms

burkej208

Baptism

18 terms

dgarnercm

IMPUESTOS

19 terms

ajavier16

What is the relationship between the World Wide Web and the Internet?

In simple terms, the World Wide Web is just one common area for information exchange, facilitated by global computer networks — or the Internet. You connect to this Internet to access the Web, but the Internet is just the connection between countless, separate servers, computers, and devices.

What is the relationship between the Internet and World Wide Web quizlet?

-The internet is a public, globally connected network of computer networks. -The web is a graphical user interface to information stored on computers running web servers connected to the internet. The web is a subset of the internet.

What is the relationship between the Internet and the World Wide Web Khan Academy?

When most of us talk about using the "Internet", we're typically talking about a specific part of the Internet: the World Wide Web (WWW, or simply, the Web). The Web is a massive network of webpages, programs, and files that are accessible via URLs. We call it a web because of its vast interconnectedness.

Which of the following describes the relationship between the Web and the Internet quizlet?

Which of the following best explains the relationship between the Internet and the World Wide Web? The Internet is a network of interconnected networks, and the World Wide Web is a system of linked pages, programs, and files that are accessed via the Internet.