What is fault tolerance in computing?
The ability of a system to continue working properly even if part of it fails.
Which of the following is the main job of HTTP?
A. Sending files from one computer to another
B. Defining how web browsers and servers communicate
C. Encrypting all internet traffic
D. Locating devices on a network
B. Defining how web browsers and servers communicate
What is the main purpose of a strong password?
To protect user accounts from unauthorized access by making ti harder for attackers to guess or crack.
Which of the following actions is most likely to help reduce the digital divide?
A. Adding a requirement that all users of a popular social media site link their accounts with a phone number
B. Deploying satellites and other infrastructure to provide inexpensive internet access to remote areas of earth
C. Digitizing millions of books from university libraries, making their full text available online
D. Offering improved internet connections to internet users who are willing to pa a premium fee for more bandwidth
B. Deploying satellites and other infrastructure to provide inexpensive internet access to remote areas of earth
Why is fault tolerance especially important for the internet?
Because the internet is made up of many connected systems, and parts can still fail at any time -- fault tolerance ensures messages can still get through.
What is the role of IP addresses in internet communication?
They uniquely identify devices on a network and allow data to be routed to the correct destination.
A student receives an email saying they won a free laptop and must click a link to claim it. What kind of cybersecurity threat is this?
A. Brute-force attack
B. Phishing
C. DDoS attack
D. Encryption
B. Phishing
Which of the following is least likely to be a contributing factor to the digital divide?
A. Some individuals and ground are economically disadvantaged and cannot afford computing devices or internet connectivity
B. Some individuals and groups do not have the necessary experience or education to use computing devices or the internet effectively
C. Some parents prefer to limit the amount of time their children spend using computing devices or the internet
D. Some residents in remote regions of the world do not have access to the infrastructure necessary to support reliable internet connectivity
C. Some parents prefer to limit the amount of time their children spend using computing devices or the internet
How does redundancy improve fault tolerance on the internet?
Redundancy provides multiple pathways for data to travel, so if one path fails, data can still reach its destination using another route.
Which protocol is responsible for breaking data into packets and reassembling them at the destination?
A. TCP
B. IP
C. DNS
D. FTP
A. TCP
How does encryption help protect information on the internet?
Encryption scrambles data so only authorized parties with the decryption key can read it, protecting it from hackers and eavesdroppers during transmission.
Which of the following actions is most likely to be effective in reducing the digital divide at a local level?
A. Creating an application that offers coupons and discounts for local businesses
B. Offering a discount to utility customers who pay their bills online instead of by mail
C. Providing free community access to computers at schools, libraries, and community centers
D. Requiring applicants for local government jobs to complete an online application
C. Providing free community access to computers at schools, libraries, and community centers
A video call continues smoothly even after a server failure. Which feature of the internet’s design most likely explains this uninterrupted performance?
A. The internet uses fixed paths to avoid dynamic rerouting.
B. The system is scalable, so it adapts to more users over time.
C. Redundant paths allow data to reroute through different servers when one fails.
D. All packets are stored temporarily until the server reconnects.
C. Redundant paths allow data to reroute through different servers when one fails.
Why does the internet use open protocols like TCP/IP and HTTP?
A. To limit access to only authorized devices
B. To allow any device or network to communicate, regardless of hardware or software
C. To make the internet faster than private networks
D. To hide data from users
B. To allow any device or network to communicate, regardless of hardware or software
Which of the following best describes a DDoS (Distributed Denial of Service) attack?
A. Stealing data from a server by decoding encrypted files
B. Using multiple devices to flood a server with traffic to crash it
C. Logging into a website with a stolen password
D. Infecting a computer with a virus to monitor its activity
B. Using multiple devices to flood a server with traffic to crash it
A school district installs high-speed internet in all schools, but many students still struggle with homework at home. What aspect of the digital divide remains unaddressed?
Many students still lack internet or devices at home, showing unequal access to technology outside of school.
After a power outage disrupts two regions, users in other areas continue to communicate online without issues. What design principle is most responsible for this resilience?
A. Centralized routing ensures backup power is sent to affected regions.
B. Data compression reduces the need for active infrastructure.
C. The internet is structured to isolate local failures and maintain global communication.
D. Internet protocols automatically restart all sessions after disruption.
C. The internet is structured to isolate local failures and maintain global communication.
Why do TCP and IP often work together, and what does each do?
TCP ensures reliable delivery of data (ordering, checking for errors), while IP handles addressing and routing the packets to their destination.
A website stores usernames and passwords in plain text. Identify the major risks of this practice.
If attackers access the database, they can see passwords directly since they aren't protected. Storing passwords in plain text creates major risk so they should be encrypted to keep them secure.
A company designs a free app for low-income families to access public services, but it only runs on newer phones. How could this worsen the digital divide?
It excludes people who have older phones or no smartphones, making the service inaccessible to the people who need it most.