Internet History and basics December 7, 2023 Contents Results - #1. What does HTTP stand for? HyperText Transfer Protocol HyperText Transfer Protocol High-Level Transfer Protocol High-Level Transfer Protocol HyperText Transmission Process HyperText Transmission Process High-Level Transmission Process High-Level Transmission Process #2. Which protocol is used for secure communication over a computer network? FTP FTP HTTPS HTTPS SMTP SMTP HTTP HTTP #3. What is the primary purpose of DNS (Domain Name System)? Encrypting data Encrypting data Resolving domain names to IP addresses Resolving domain names to IP addresses Managing email communication Managing email communication Routing data packets Routing data packets #4. Which of the following is a top-level domain (TLD)? www www .com .com http http ftp ftp #5. What does the acronym URL stand for? Universal Resource Locator Universal Resource Locator Uniform Resource Locator Uniform Resource Locator Unique Resource Locator Unique Resource Locator Universal Routing Locator Universal Routing Locator #6. Which Internet service allows individuals and organizations to make their websites accessible on the World Wide Web? ISP (Internet Service Provider) ISP (Internet Service Provider) HTTP HTTP Web hosting Web hosting DNS DNS #7. What is the purpose of an IP address? Identifying a device on a network Identifying a device on a network Encoding website content Encoding website content Managing email communication Managing email communication Establishing secure connections Establishing secure connections #8. Which of the following is a common method of securing online communication by encrypting data between a user's browser and a website? IPsec (Internet Protocol Security) IPsec (Internet Protocol Security) SSL/TLS (SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are cryptographic protocols) SSL/TLS (SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are cryptographic protocols) SSH (Secure shell) SSH (Secure shell) ARP (Address Resolution Protocol) ARP (Address Resolution Protocol) #9. What is the purpose of a cookie in the context of web browsing? Storing website content Storing website content Managing network connections Managing network connections Tracking user preferences and sessions Tracking user preferences and sessions Resolving domain names Resolving domain names #10. Which Internet protocol is used for sending emails? FTP (File Transfer Protocol) FTP (File Transfer Protocol) SMTP (Simple Mail Transfer Protocol) SMTP (Simple Mail Transfer Protocol) HTTP HTTP POP (Post office protocol, Obsolete) POP (Post office protocol, Obsolete) #11. What does IoT stand for in the context of the Internet? Internet of Things Internet of Things Internet of Technology Internet of Technology Internet of Transactions Internet of Transactions Internet of Telecommunications Internet of Telecommunications #12. Which of the following is a commonly used web browser? FTP Explorer FTP Explorer Mozilla Thunderbird Mozilla Thunderbird Google Chrome Google Chrome Microsoft Word Microsoft Word #13. What is the purpose of a firewall in the context of computer networks? Encrypting data transmission Encrypting data transmission Blocking unauthorized access Blocking unauthorized access Managing email communication Managing email communication Assigning IP addresses Assigning IP addresses #14. Which Internet protocol is responsible for translating human-readable domain names into numerical IP addresses? FTP FTP DNS (Domain Name System) DNS (Domain Name System) DHCP (Dynamic Host Control Protocol) DHCP (Dynamic Host Control Protocol) TCP (Transmission Control Protocol) TCP (Transmission Control Protocol) #15. What does the acronym HTML stand for? HyperText Markup Language HyperText Markup Language High-Level Transfer Language High-Level Transfer Language HyperText Modeling Language HyperText Modeling Language Human Transfer Markup Language Human Transfer Markup Language #16. Which of the following is NOT a commonly used type of Internet connection? DSL DSL Fiber-optic Fiber-optic LAN LAN Dial-up Dial-up #17. What is the purpose of a search engine on the Internet? Transmitting emails Transmitting emails Indexing and retrieving web pages Indexing and retrieving web pages Managing network security Managing network security Resolving domain names Resolving domain names #18. Which Internet service allows users to retrieve and view web pages? Email Email FTP FTP WWW WWW DNS DNS #19. What is the purpose of the protocol SNMP (Simple Network Management Protocol)? Securing communication Securing communication Managing network devices and monitoring performance Managing network devices and monitoring performance Transferring files Transferring files Resolving domain names Resolving domain names #20. What does the acronym VPN stand for? Virtual Private Network Virtual Private Network Very Private Network Very Private Network Virtual Public Network Virtual Public Network Variable Protocol Network Variable Protocol Network #21. Which organization is responsible for assigning and managing IP addresses globally? W3C (World Wide Web Consortium) W3C (World Wide Web Consortium) ICANN (Internet Corporation for Assigned Names and Numbers) ICANN (Internet Corporation for Assigned Names and Numbers) IEEE (Institute of Electrical and Electronics Engineers) IEEE (Institute of Electrical and Electronics Engineers) IETF (Internet Engineering Task Force) IETF (Internet Engineering Task Force) #22. What is the purpose of a proxy server in the context of the Internet? Blocking unauthorized access Blocking unauthorized access Encrypting data transmission Encrypting data transmission Filtering and forwarding network traffic Filtering and forwarding network traffic Resolving domain names Resolving domain names #23. Which Internet service is commonly used for real-time communication through text messages? IM (text-based communication in real time) IM (text-based communication in real time) FTP FTP VoIP (voice communication over the internet) VoIP (voice communication over the internet) HTTP HTTP #24. What does the term "bandwidth" refer to in the context of Internet connections? Amount of data stored on a device Amount of data stored on a device Speed of data transmission Speed of data transmission Size of a web page Size of a web page Number of connected devices Number of connected devices #25. Which of the following is a common method of authenticating users on websites? IP address verification IP address verification Biometric authentication Biometric authentication Captcha Captcha HTTP authentication HTTP authentication #26. What is the purpose of the protocol DHCP (Dynamic Host Configuration Protocol)? Translating domain names to IP addresses Translating domain names to IP addresses Assigning dynamic IP addresses to devices on a network Assigning dynamic IP addresses to devices on a network Securing communication Securing communication Managing email communication Managing email communication #27. Which of the following is NOT a valid file transfer protocol used on the Internet? FTP FTP HTTP HTTP SMTP SMTP SFTP (Secure File Transfer Protocol) SFTP (Secure File Transfer Protocol) #28. What is the primary function of a router in a computer network? Blocking unauthorized access Blocking unauthorized access Transmitting emails Transmitting emails Managing network traffic and directing data packets Managing network traffic and directing data packets Assigning IP addresses Assigning IP addresses #29. What is the purpose of the protocol POP (Post Office Protocol)? Opposite is IMAP (Internet Message Access Protocol) Transmitting emails Transmitting emails Managing network security Managing network security Filtering and forwarding network traffic Filtering and forwarding network traffic Retrieving emails from a server Retrieving emails from a server #30. Which of the following is a security measure to protect against unauthorized access by encrypting data transmission? VPN VPN Firewall Firewall HTTPS HTTPS DNS DNS #31. When was the concept of the ARPANET, the precursor to the internet, first proposed by the United States Department of Defense? 1950s 1950s 1960s 1960s 1970s 1970s 1980s 1980s #32. In which year was the first successful message sent over the ARPANET, connecting computers at UCLA and Stanford Research Institute? 1965 1965 1969 1969 1973 1973 1980 1980 #33. The term "internet" is derived from the words: Information Network Information Network Interconnected Network Interconnected Network International Network International Network Intranet Intranet #34. The protocol used for transferring files over the internet is: TCP/IP TCP/IP FTP FTP HTTP HTTP SMTP SMTP #35. The World Wide Web (WWW) was invented by: Tim Berners-Lee while working at CERN Tim Berners-Lee while working at CERN Bill Gates Bill Gates Mark Zuckerberg Mark Zuckerberg Steve Jobs Steve Jobs #36. The first graphical web browser, Mosaic, was developed in the early: 1980s 1980s 1990s 1990s 2000s 2000s 2010s 2010s #37. The organization responsible for assigning domain names and IP addresses is: W3C (World Wide Web Consortium) W3C (World Wide Web Consortium) IETF (Internet Engineering Task Force) IETF (Internet Engineering Task Force) ICANN (Internet Corporation for Assigned Names and Numbers) ICANN (Internet Corporation for Assigned Names and Numbers) IEEE (Institute of Electrical and Electronics Engineers) IEEE (Institute of Electrical and Electronics Engineers) #38. The transition from IPv4 to IPv6 is primarily due to: Faster internet speed Faster internet speed Increased security Increased security Exhaustion of IPv4 addresses Exhaustion of IPv4 addresses Improved website design Improved website design #39. The concept of e-commerce, buying and selling goods over the internet, gained popularity in the: 1980s 1980s 1990s 1990s 2000s 2000s 2010s 2010s #40. The first popular web search engine, launched in 1994, was: Google (1998) Google (1998) Yahoo (1995 officially launched) Yahoo (1995 officially launched) AltaVista (1993) AltaVista (1993) Bing Bing #41. The concept of social networking on the internet became widespread with the launch of: Facebook (2004) Facebook (2004) LinkedIn LinkedIn Twitter Twitter MySpace MySpace #42. The term "blog" is a contraction of: Binary log Binary log Web log Web log Bit catalog Bit catalog Byte blog Byte blog #43. The technology that enables the creation and exchange of digital currencies like Bitcoin is known as: Cryptography Cryptography Blockchain Blockchain Cybersecurity Cybersecurity Virtualization Virtualization #44. The first widely used web browser, released in 1993, was: Internet Explorer Internet Explorer Netscape Navigator Netscape Navigator Mosaic Mosaic Opera Opera #45. The concept of cloud computing involves: Localized data storage Localized data storage Distributed computing over the internet Distributed computing over the internet Offline data access Offline data access Mainframe computing Mainframe computing #46. The concept of net neutrality is related to: Equal access to the internet for all users Equal access to the internet for all users Government censorship of online content Government censorship of online content Monopoly of internet service providers Monopoly of internet service providers Internet speed optimization Internet speed optimization #47. The first email system allowing users to send messages across different computers was developed at: MIT (Massachusetts Institute of Technology) MIT (Massachusetts Institute of Technology) Stanford Stanford Xerox PARC (Palo Alto Research Center Incorporated) Xerox PARC (Palo Alto Research Center Incorporated) UCLA (University of California, Los Angeles) UCLA (University of California, Los Angeles) #48. The concept of Wi-Fi, allowing wireless internet connectivity, was standardized under the name: IEEE 802.11 IEEE 802.11 Bluetooth Bluetooth NFC (Near Field Communication) NFC (Near Field Communication) GSM (Global System for Mobile Communications) GSM (Global System for Mobile Communications) #49. The development of the internet as a global network was significantly accelerated by the introduction of: Dial-up connections Dial-up connections Broadband connections Broadband connections Satellite internet Satellite internet Fiber-optic cables Fiber-optic cables #50. The concept of the "Internet of Things" (IoT) refers to: Networking of computers Networking of computers Interconnected web browsers Interconnected web browsers Interlinked websites Interlinked websites Interconnected devices and objects Interconnected devices and objects #51. The first social media platform, launched in 1997, was: Facebook Facebook Twitter Twitter Six Degrees Six Degrees Friendster Friendster #52. The concept of a web browser cookie is used for: Encryption Encryption Tracking user activity & Storing User/ website preferences Tracking user activity & Storing User/ website preferences Enhancing website security Enhancing website security Browser customization Browser customization #53. The concept of online streaming of video content became popular with the launch of: Hulu Hulu Netflix Netflix YouTube YouTube Amazon Prime Video Amazon Prime Video #54. The organization that played a crucial role in the development of the internet, including the creation of the ARPANET, is: IBM IBM Microsoft Microsoft DARPA (Defense Advanced Research Projects Agency) DARPA (Defense Advanced Research Projects Agency) Xerox Xerox #55. The concept of a firewall is used for: Blocking physical access to servers Blocking physical access to servers Monitoring internet traffic Monitoring internet traffic Preventing unauthorized access to computer networks Preventing unauthorized access to computer networks Enhancing internet speed Enhancing internet speed #56. The concept of the dark web refers to: Encrypted internet connections Encrypted internet connections Hidden websites accessible only through specific browsers Hidden websites accessible only through specific browsers Censorship-resistant internet Censorship-resistant internet Online gaming platforms Online gaming platforms #57. The concept of a podcast involves: Streaming live video content Streaming live video content Digital audio recordings available for download or streaming Digital audio recordings available for download or streaming Social media posts Social media posts Online forums for discussions Online forums for discussions #58. The first message sent over the ARPANET was between computers at: Stanford and UCLA Stanford and UCLA MIT and Harvard MIT and Harvard Xerox PARC and IBM Xerox PARC and IBM Microsoft and Apple Microsoft and Apple #59. The concept of geolocation on the internet involves: Determining the physical location of a device or user Determining the physical location of a device or user Encrypting online communications Encrypting online communications Filtering internet content Filtering internet content Enhancing internet speed Enhancing internet speed #60. The process of converting a domain name into its corresponding IP address is known as: Routing Routing DNS resolution DNS resolution Subnetting Subnetting DHCP DHCP #61. The internet protocol that allows devices on the same local network to obtain an IP address automatically is: TCP TCP IP IP DHCP DHCP UDP (User Datagram Protocol, Connectionless) UDP (User Datagram Protocol, Connectionless) #62. Which of the following is not a top-level domain (TLD)? .com .com .net .net .ftp .ftp .org .org #63. The internet browser developed by Mozilla is: Chrome Chrome Safari Safari Firefox Firefox Edge Edge #64. Which of the following is a valid IP address format? 256.168.1.1 256.168.1.1 192.168.0.256 192.168.0.256 10.0.0.1 10.0.0.1 172.32.500.10 172.32.500.10 #65. The concept of "cookies" in web browsers is primarily used for: Storing user credentials Storing user credentials Tracking user preferences and sessions Tracking user preferences and sessions Blocking advertisements Blocking advertisements Managing browser extensions Managing browser extensions #66. The internet protocol responsible for email communication is: SMTP SMTP POP POP IMAP IMAP FTP FTP #67. The concept of a "firewall" in the context of computer networks is used for: Blocking unwanted emails Blocking unwanted emails Monitoring internet usage Monitoring internet usage Controlling access to a network Controlling access to a network Speeding up internet connections Speeding up internet connections #68. The standard port number for HTTP traffic is: 80 80 443 (HTTPS) 443 (HTTPS) 8080 (alternative port for HTTP traffic) 8080 (alternative port for HTTP traffic) 21 (FTP) 21 (FTP) #69. Which internet service allows files to be transferred between computers over the internet? FTP FTP HTTP HTTP SMTP SMTP UDP UDP #70. The protocol used for secure file transfer is: FTP FTP SFTP SFTP FTPS FTPS HTTP HTTP #71. The internet protocol used for real-time communication and video conferencing is: HTTP HTTP SIP (Session Initiation Protocol) SIP (Session Initiation Protocol) SMTP SMTP POP POP #72. The concept of "phishing" in internet security refers to: Protecting personal information Protecting personal information Maliciously obtaining sensitive information through deception Maliciously obtaining sensitive information through deception Filtering spam emails Filtering spam emails Encrypting communication channels Encrypting communication channels #73. The file format commonly used for web graphics with support for transparency is: GIF (Graphics Interchange Format) GIF (Graphics Interchange Format) JPEG (Joint Photographic Experts Group) JPEG (Joint Photographic Experts Group) PNG (Portable Network Graphics) PNG (Portable Network Graphics) BMP (Bitmap Image File or Windows Bitmap) BMP (Bitmap Image File or Windows Bitmap) #74. The internet standard that defines how email messages are formatted and transmitted is: SMTP SMTP POP POP IMAP (Internet Message Access Protocol) IMAP (Internet Message Access Protocol) MIME (Multipurpose Internet Mail Extensions) MIME (Multipurpose Internet Mail Extensions) #75. The concept of "bandwidth" (maximum data transfer rate of a network connection) in internet terms refers to: The speed of a network connection The speed of a network connection The amount of data that can be transmitted over a network The amount of data that can be transmitted over a network The range of frequencies used for data transmission The range of frequencies used for data transmission The distance between network nodes The distance between network nodes #76. The web protocol that allows for the secure transfer of hypertext content is denoted by: HTTP HTTP FTP FTP HTTPS HTTPS SMTP SMTP #77. The technology that enables a web page to dynamically update without requiring a full page reload is known as: AJAX (Asynchronous JavaScript and XML) AJAX (Asynchronous JavaScript and XML) HTML HTML XML (eXtensible Markup Language) XML (eXtensible Markup Language) CSS (Cascading Style Sheets) CSS (Cascading Style Sheets) #78. The internet standard for encrypting data transmission over a network is: SSL SSL TLS (TLS is the successor to SSL (Secure Sockets Layer) TLS (TLS is the successor to SSL (Secure Sockets Layer) HTTPS HTTPS SSH SSH #79. The term "IPV6" refers to the: 32-bit internet protocol version 32-bit internet protocol version 64-bit internet protocol version 64-bit internet protocol version 128-bit internet protocol version 128-bit internet protocol version 256-bit internet protocol version 256-bit internet protocol version #80. The concept of "cloud computing" involves: Localized data storage on physical servers Localized data storage on physical servers Accessing and storing data over the internet Accessing and storing data over the internet Wireless data transmission between devices Wireless data transmission between devices Manual data backups on external drives Manual data backups on external drives #81. The internet technology that allows web browsers to request and display content without reloading the entire page is known as: AJAX AJAX HTML HTML XML XML RSS RSS #82. The programming language commonly used for creating dynamic web pages is: Java Java Python Python JavaScript JavaScript C# C# #83. The technology that enables secure communication between a web browser and a server is: SSL SSL TLS TLS HTTPS HTTPS SSH SSH #84. The internet standard that defines the rules for transferring files between computers is: HTTP HTTP FTP FTP SMTP SMTP TCP TCP Finish