Test 11 Edhesive Questions & Answers
Every device on a network has its own IP address. - ✔✔True
ISP stands for _____________ _____________ _____________ - ✔✔Internet Service Provider
A protocol is __________. - ✔✔A se
...
Test 11 Edhesive Questions & Answers
Every device on a network has its own IP address. - ✔✔True
ISP stands for _____________ _____________ _____________ - ✔✔Internet Service Provider
A protocol is __________. - ✔✔A set of rules and standards
IP stands for ____________ ____________? - ✔✔Internet Protocol
Most IPv4 addresses today are ______ bits long, divided into 4 sections of ______ bits each. -
✔✔32, 8
How many unique addresses are there using IPv4? - ✔✔4 billion
Put the following steps in order:1) Content from the IP address is loaded2) Computer uses DNS
to look up the domain name3) Type in the URL4) IP address is fetched - ✔✔3, 2, 4, 1
______________ is when a hacker taps into the DNS and changes an entry to point at the wrong
IP address. - ✔✔Spoofing
______________ is a network of networks. - ✔✔Internet
Data on the internet travels in a fixed path from sender to receiver. - ✔✔False
Transmission Control Protocol is _____________. - ✔✔A set of rules that manage how
information is sent over the Internet.
Routers are _____________. - ✔✔Devices that manage traffic on the Internet.
Packets are _____________. - ✔✔Information sent over the Internet that is broken into
individual pieces.
Currently we are transitioning to IP version __________. - ✔✔6
DNS stands for _____________. - ✔✔Domain Name System
HTML Stands for __________ __________ __________ __________. - ✔✔Hyper Text Markup
Language
A browser's job is to ______________. - ✔✔Translate HTML code to a webpage we see on the
screen.
Why aren't electrical signals used to transmit all data on the internet? - ✔✔Electrical signals can
fade after travelling short distances
Communication protocols are a set of rules that are agreed to by all parties that have been
designed in order to - ✔✔Ensure that new technologies and devices that haven't been invented
yet can all use the same methods of communication
Why are IP addresses that are longer than 32-bits being assigned - ✔✔The four billion addresses
available under the IPv4 protocol will all be used at some point in the future. The new, longer
addresses are needed to ensure that the supply of addresses will be greater than the demand for
addresses.
Put the following steps in order:1) Content from the IP address is loaded2) Computer uses DNS
to look up the domain name3) IP address is fetched4) Type in the URL - ✔✔4, 2, 3, 1
Because there is typically only one pathway available for each packet of of information traveling
over the internet, if any server on a given route fails, the information will not reach its
destination. T/F - ✔✔False
Which of the following can be sent in one piece over the internet? - ✔✔None of the items listed.
Each one is made up of hundreds of thousands of bits, so each must be broken into packets to be
sent over the internet
When a website asks your browser for a secure connection over the Secure Sockets Layer (SSL),
which of the following acts as a digital ID card that verifies that the website really is the one it
claims to be? - ✔✔A digital certificate
What of these describes markup languages? - ✔✔Transforms text into the images, links, tables,
and lists that make up web pages and other documents.
The commands in between the < > are called _____________. - ✔✔Tags
Which symbol marks a closing tag? - ✔✔/
Open the W3 Schools editor found at the following
link:https://www.w3schools.com/tags/tryit.asp?filename=tryhtml_paragraphs1 (Links to an
external site.)Links to an external site.In the editor change the first instance of
This is a
paragraph.
to
This is a paragraph.
Then, hit the "Run" button to view
how your updated HTML impacts the content displayed.What happens? - ✔✔The first line that
says "This is a paragraph." is now centered horizontally on the screen.
Which tag is used to create paragraphs? - ✔✔
What's the body of an HTML file? - ✔✔The area where the page content is stored.
The
of an HTML file ____________________. - ✔✔contains information about the file
Which tag is used to change the name of your page in the browser? - ✔✔Title
This HTML tag defines a section of text. All whitespace in the section of text is ignored and a
blank line is placed after the closing tag - ✔✔
This HTML tag is used to add links to web pages - ✔✔
The tags include a return at the end of the line. T/F - ✔✔True
What is the largest number you can use with the tags - ✔✔6
This HTML tag is used to add images to webpages - ✔✔
Change
To
- ✔✔The image is replaced with a large image of a trout
____________ is protecting against the criminal or unauthorized use of electronic data, or the
measures taken to achieve this - ✔✔Cybersecurity
Disguising a virus as a security update is a common way of infecting a computer. T/F - ✔✔True
A piece of code that is capable of copying itself and typically has a detrimental effect, such as
corrupting the system or destroying data - ✔✔Virus
Which of the following will be most likely to increase the speed at which information travels
from a server to a student's laptop? - ✔✔An increase in the bandwidth of the network
Radio waves are ___________ - ✔✔used to send bits wirelessly
Which of the following pairs of tags cannot be used to make text bold - ✔✔
When information is sent over the internet in a secure manner, hackers are unlikely to be able to
access it because ________. - ✔✔encryption techniques mean that even with the world's most
sophisticated computers, hackers will need many years to find the security keys that will enable
them to gain access to encrypted information sent over the inte
[Show More]