What is the relationship between the internet and the world wide web? khan academy
Upgrade to remove ads Show Only SGD 41.99/year
Terms in this set (134)Tiffany is helping a family member learn how to use Gmail. Contact the Gmail team via social media or phone Close the Gmail tab TCP/IP are the protocols that route data around the internet. IP is responsible for routing of packets from source to destination across the internet. TCP is responsible for reliable transmission of packets. IP v4 addresses currently cost more to lease than in the past. There are very few available IP v4 addresses in the world, and the scarcity increases the demand. Over the years, engineers have invented many networking technologies for LANs (local area
networks). Many are still in use, and many of the very slow ones were abandoned long ago. "LocalTalk" @ 230 kbit/s "LocalTalk" @
230 kbit/s Startuppr is a web company that's running their servers out of their garage. Uptime is important to them, so they pay for two internet service providers, Xfinity & Wave. The ISP routers then send their server's packets to the rest of the internet. Router A NSFNET was an early internet connecting the computer science departments of universities. In 1986, NSFNET connected 6 departments across the US: 4 routes D'Andre is riding a train with wireless internet service. When he logs online, he sees a warning that the wireless network has limited bandwidth. Watching online movies Downloading a large application Which of these could be a valid IP v4 or IP v6 address? 192.168.17.43 2001:0db8:85a3:03eF:7cb3:8a2e:0370:7334 Which of these is the best description of the domain name system (DNS)? The domain name system associates domain names with IP addresses, like "www.youtube.com" with 208.65.153.251. Each IP packet contains a sequence number. It helps the receiving computer reassemble the packets. Comcast, an Internet Service Provider in the US, has many IP addresses that it can assign to its customer's
computers. One IP address is 24.128.139.211. The first part of the address (24.128) identifies the network (Comcast) and the second part (139.211) identifies the individual customer. Nadia is at an internet cafe in Paraguay, where the download speed is 600 kbps. She's chatting with her friend Jun in Singapore, where the download speed
is 60 Mbps. 100x Consider the website: help is a subdomain of donorschoose.org org is a top-level domain Why does each IP packet contain a destination address? Routers use the destination address to decide where to send a packet Over the years, engineers have invented many networking technologies for WANs (wide area networks), connecting large geographic regions like cities and states. The slower technologies are mostly obsolete, but may still be used in
developing nations. "56k line" @ 56 kbit/s When packets are routed on the internet, the
route for a particular packet is not pre-determined. Instead, the next hop is decided by each router along the way. Each router can pick a connection that's currently working and available. Taylor switched WiFi networks from an AT&T network to a Verizon network. He noticed his IP address changed. Verizon has a different set of IP addresses to allocate than AT&T, so Verizon had to give Taylor's computer a different IP address than the AT&T address. Which of these is an accurate description of how the TCP/IP protocols send data around the internet? Computers split messages into packets, and send them through routers to their final destination. The destination computer acknowledges the receipt of each packet, so that the sending computer can ensure every packet is delivered. A new internet provider ZoomyZoomy is creating advertising for their fast upload speed. Sign up now for an upload speed of 50 Mbps Which are the primary aspects of the domain name system (DNS) that
help it scale? Scalability in the DNS is helped by caching of domain ↔ IP mappings on multiple machines. Scalability in the DNS is helped by the division of labor between root name servers, TLD name servers, and host name servers. DevFest is a conference that wants to make sure it has a reliable connection to the internet. The conference partners with
two internet providers, Comcast and Sonic, just in case one of them goes down. The ISP routers then connect to the rest of the internet. Router A What is the main advantage of the IP v6 addressing protocol? IP v6 allows for more addresses than IP v4. An intranet is a private network set up for an organization like a company or university. If these 2 connections go down: D to E, and B to C. If these 2 connections go down: D to E, and C to E. Jay is playing BigBalloon, an online multiplayer balloon popping game, and is trying to help his team win during a rumble with another team. Jay's on an internet connection with too high latency. TCP/IP are the protocols that route data around the internet. TCP is responsible for reliable transmission of packets. IP is responsible for routing of packets from source to destination across the internet. The most recent big DNS cache poisoning attacks have been on the cryptocurrency websites MyEtherWallet and Trezor. Those websites help users keep track of their cryptocurrency investments, and they store user credentials that are used for buying and selling. They can direct those websites to fake websites that ask users for secure information that they can then use on the real website. NSFNET was an early internet connecting the computer science departments of universities. In 1986, NSFNET connected 6 departments across the US: 3 routes Consider the website: blog is a subdomain of gardeningknowhow.com blog is a third-level domain Rosa is trying to explain to a classmate that IP addresses are hierarchical. The first part of an IP address specifies the network, the next part specifies the individual node in the network. Each IP packet contains a destination address. It helps the router know where to send the packet. Noemi works out of an office in San Francisco that recently got an upgrade to a 1 Gigabit Fiber internet connection. 2000x Which of these best describes the fault tolerance of routing on the internet? There are multiple routes for each IP packet to follow. A packet can be re-routed if a path becomes unavailable. Imagine an internet without the domain name system (DNS). Without the domain name system, we would not be able to use nice URLs like "facebook.com" to visit websites on the internet. Why does each IP packet contain a sequence number? Computers use the sequence number to determine the original order of the packets. Emily is trying to use her home computer as a server. She told the IP address to her friend Kolby, and he was able to send messages from his computer to hers. Emily's ISP assigned a different IP address to her computer after the power came back on. Computer A wants to send data to Computer B using the TCP/IP protocols.
Computer A splits the data into packets. It does a three-way handshake with Computer B to establish the connection, then sends each packet to the nearest router. If it detects packet loss, it re-sends the missing packets. Jelani is a student in a Somalia school, where their internet download speed is 400 kbps. He visits relatives in Oakland, California, and stays at a home where the download speed is 60 Mbps. 150x Bailey decides to make their own version of the internet. To map domains to IP addresses, he sets up a single computer that stores every mapping. If the computer turns off, no other computer will be able to find out how to map domain names to IP addresses. Once many computers join their internet, the computer may be overwhelmed by requests and not be able to handle all of them in a reasonable amount of time. What is the Transmission Control Protocol (TCP) responsible for? What is the Internet Protocol (IP) responsible for? TCP is responsible for reliable transmission of packets. IP is responsible for routing of packets from source to destination across the internet. Reina navigates to her bank's website:
Cyber criminals hacked into a DNS server and redirected the mapping for the "banksrus.com" domain name to an IP address that they control. We use modems to connect our home network to the larger network provided by our internet provider (and ultimately the whole internet). "Bell 101" @ 110 bits/s GameCon is a multiplayer gaming tournament that wants to make sure its connection to the
internet is reliable. The conference partners with three internet providers (AT&T, Sonic, and Verizon) just in case one of them goes down. The ISP routers then connect to the rest of the internet. Router A There is a
large difference in IP v6 adoption across the world. If a country's ISPs don't adopt IP v6, they may run out of addresses when too many devices want to use the internet in their country. Jewel is playing Agar, a multiplayer online game where cells gain mass by eating other cells in a petri dish. If she connects to a regional server, her connection will be lower latency than before. In the Internet Protocol (IP), computers send messages to each other through a network of routers, with each message split up into packets. Routers look at the IP packet header and use the destination address field. An intranet
is a private network set up for an organization like a company or university. If these 2 connections go down: B to C, C to D. If the connection between D and E goes down. The University of California at Davis has many IP addresses that it can assign to its campus computers. One IP address is 169.237.121.44. The first part of the address (169.237) identifies the network (UC Davis) and the second part (121.44) identifies the campus computer. Consider the website: eecs is a subdomain of berkeley.edu edu is a top-level domain An online ads distributor
AddTheAds claims that its server has lower latency than other ad servers. "Our ad server has a latency of just 40 ms" The Mozilla Firefox browser gives users three different ways they can disable cookies. The most restrictive option to "disable all cookies" includes a note that it will cause websites to break. A login that works across multiple pages of the website. Public key encryption is considered "asymmetric" encryption due to its use of two keys for encryption and decryption while the Caesar Cipher is considered "symmetric" since it uses the same key for both. The recipient's public key is used to encrypt the data; the recipient's private key is used to decrypt the data. Eliott came up with a scheme for encrypting messages to send to his friend in class. He wanted to use the Caesar Cipher, but his classmates already knew it, so he added a twist on top of it. "MEET_ME_AT_THE_LOCKERS_AT_THREE". "TAMT_ET_AHT_COLKARS_ET_RHTAA". "HOAH_SH_OVH_QCZYOFG_SH_FVHOO". He needs to share an encryption key with his friend before they can decrypt his messages. A 3-step explanation of how he encrypted the message (the in-word letter swap, the A and E swap, and the Caesar shift of 14). Mr. Jones bought a server where his students can upload their homework assignments, and mapped it to the domain "writing302.org". He then acquired a digital certificate for "writing302.org" from a certificate authority and installed it on the server. The certificate proves that "writing302.org" and its associated encryption key are both owned by the same entity. HTTPS is a combination of multiple internet protocols that provides secure browsing on the web. HTTPS retrieves webpages using the HTTP protocol, and uses the TLS protocol to wrap the HTTP requests and responses in a layer of security. Arthur
clicks a link from a chat with his friend that opens "https://www.charitywater.org/". Arthur's browser sent an HTTP request to the web server that hosts "charitywater.org". The web server sent back an HTTP response with the HTML for the webpage. Logan types this URL in his browser's address
bar: HTTP Imagine you're trying to explain the domain name system (DNS) to a 5 year old. The domain name system is like a phone book for the internet. What types of encryption are used in the TLS protocol to ensure secure communication between a client and server? It starts with public key encryption and then uses symmetric encryption. NSFNET was an early internet connecting the computer science departments of universities. In 1986,
NSFNET connected 6 departments across the US: 3 routes Jaime received an email from his favorite movie streaming service. The email stated that all customers were being
asked to reset their passwords (due to a security breach) and linked to a webpage with a password reset form. The webpage asks him to confirm his old password and then enter a new password. The attackers could try using the "old password" and "new password" to login to Jaime's accounts on other sites. Keung types in the URL for an online email service and sees this in the browser bar: His ISP can inject advertisements into the emails. A cybercriminal can steal his password. The Transmission Control Protocol (TCP) splits each message into multiple packets. It's possible for packets from the same message to arrive out of order. Sequence number The administration of a high school decides to install antivirus software on all of the school computers. The antivirus software can protect the computers from any malware that it is able to successfully detect. These are screenshots of URLs loaded in the Firefox web browser, which uses visual indicators to indicate the security of a web connection. (Locked) https://www.bbc.com Mason receives an email from a law firm called
"Baker & McKenzie". The email states that they are scheduled to appear in court and includes a link to view the court notice. They can email In 2016, the ACLU reported that a company called Geofeedia analyzed data from social media websites like Twitter and Instagram to find users
involved in local protests and sold that data to police forces. The data included usernames and their approximate geographic locations. Geofeedia claims the data was all publicly available data. Cookies Devon navigates to "https://www.kidsalive.org/" in his browser and sees this on the front page: The HTML of the webpage In 2000, a 15-year-old launched a DDoS attack against the servers of the Yahoo search engine, resulting in users being unable to use Yahoo for an entire hour.
The attack used a large number of compromised computers to send requests to the Yahoo servers, rendering them unable to answer legitimate requests. The most time-intensive part of public key encryption is the generation of the key pair. Processing power: the computer has to do a series of difficult mathematical operations on very large numbers, like generating randomness and checking for prime-ness. Processing power: the computer has to do a series of difficult mathematical operations on very large numbers, like generating randomness and checking for prime-ness. Verifying a computer has a trusted certificate Establishing an encrypted communication channel between 2 computers In 2012, cyber criminals launched DDoS
attacks on 6 popular US banking websites. They hijacked hundreds of computers and sent traffic that peaked at 60 Gbps. Visitors to the websites were unable to use the websites during the attack. Which of these users has the strongest password? Marjorie combines 5 random words and alternates the casing: "scarves-TOKYO-theme-TEAMWORK-trulia". Computer A wants to send data securely to Computer B using public key encryption. Computer B's public key In the modern age of computers, we cannot use the same symmetric encryption schemes that were used 1000 years ago or even a 100 years
ago. Older encryption schemes are easy to crack with computers, since a computer can quickly perform frequency analysis and try out many keys. An office receives a copyright infringement notice from their ISP. The notice claims they have evidence that someone in the office illegally downloaded a copyrighted movie on a particular day. The office manager
asks around and finds out that, yes, one of the employees did download that movie. The ISP monitored the internet traffic coming from each of the computers using the office's connection. Lavanya is shopping for her first house. At an open house, a real estate agent calls the house a "smart home" and explains that all of the home appliances are also
computing devices that are connected together in a computer network. The computing devices can transfer data to each other. Which of these situations describes the creation of a computer network? A college campus creates multiple computer labs in different parts of the campus and connects the labs to each other with underground fiber optic cables. Students can save their file on a computer in one lab and still access their files from another lab. Which statements are true about computing devices? 1 Which of these situations describes a computer network? A company gives every employee a desktop computer and connects each of the computers to each other using wires, so that they can quickly transfer files and messages. Which of these situations describes a computer network? A video gaming club sets up six powerful computers in a room and connects them with Ethernet cables to a router. The club members play multi-player games together. A gardener sets up a network for a garden using a variety of devices: All of them (the computer, router, camera, and sensor) Which statement is true about computing devices in a computer network? Each computing device must be able to send data to the other computing devices. A company moved into a new office space and needs to sign up with an Internet provider. The BroadbandUp connection can transfer four times the amount of data per second. Josiah used a tool to measure how many bits he could transfer over his home connection to the Internet. 1100 bits/s In 2015, the nation of Burundi had an average bandwidth per Internet connection of 11.24 kb/s. In 2016, their average bandwidth was 6.91 kb/s. Internet connections in Burundi in 2015 were able to transfer more bits per second than connections in Burundi in 2016. A new high school is built and needs to be connected to the Internet. SpectralWeb can transfer 222 times more data per second than TopSat. Makayla used a tool to measure how many bits she could transfer over her classroom's Internet connection. 5500 bits/s Which of the following statements about IP addresses is true? When data is sent between devices on the Internet, they identify each other with an IP address. Bharat runs a computer room at a library. The room has a variety of Internet-connected devices: All of them (the desktop computers, 3-d printer, and security camera) In what situations is the Internet Protocol (IP) used? It is used every time that two computing devices send data to each other over the Internet. Which of the following is the best description of an IP address? A number assigned to a computing device that can receive data on the Internet Which of the following kinds of computing devices use the Internet Protocol (IP) when sending data over the Internet? 1,2,3 When do Internet-connected computing devices use the Internet Protocol (IP)? It is used whenever two computing devices send data to each other over the Internet. How often is the Internet Protocol (IP) used in Internet communications? It is used whenever two computing devices communicate with each other over the Internet Which of these addresses is the kind used by the Internet Protocol (IP) to identify devices that are connected to the Internet? 242.185.95.235 Which of the following is the best description of how routing works on the Internet? A computer stores the destination IP address in the IP packet header and sends the packet to the nearest router. The router looks at the IP address and decides where to send the packet next based on a lookup table. The next router does the same, until the packet finally ends up at its destination. What is the job of a router during the process of routing on the Internet? The router's job is to look up the destination IP address in their forwarding table, determine the next router that will get the packet closer to its destination, and send the packet to the router. Startuppr is a web company that's running their servers out of their garage. Their network administrator is tasked with determining if there is a single point of failure in the network—a router whose outage could cause their servers to lose connection to the Internet. 2 A gaming company is putting together a gaming tournament called GameCon. Some of the competitions will be with players outside of the conference, so the organizers want to make sure their connection to the Internet is reliable. The organizers partner with three Internet providers
(Veryzone, BD&D, and InfiniX). Router B The following table compares two data transport protocols from the suite of protocols powering the Internet. Protocol 1 = TCP, Protocol 2 = UDP Rafi is developing an application to
send urgent information about global health crises over the Internet to hospitals. Rafi can use the Transmission Control Protocol for communication, since TCP has ways to recover when packets are lost. The following table compares
two data transport protocols from the suite of protocols powering the Internet. Protocol 1 = UDP, Protocol 2 = TCP One problem with packet-based messaging systems like the Internet Protocol is that packets might
arrive out of order. The TCP metadata includes fields that describe where the packet belongs in the sequence. Which statement is true about packet loss on the Internet? When two computers are using the Transmission Control Protocol (TCP), the packets that they send to each other can be lost along the way, but they can be recovered via retransmission. What is the relationship between the Internet and the World Wide Web? The World Wide Web is built on top of the Internet. Fen navigates to
"https://www.conservationfund.org/" in her browser and sees this on the front page:The front page includes a logo, photos, a video, an interactive slideshow, and a custom font. The HTML of the webpage Ororo typed this URL in her browser's address bar: TCP Many people worry about what would happen if either the
Internet or the World Wide Web went down (if they suffered a complete outage and were unreachable). If the Internet went down, the World Wide Web would also go down, since the WWW relies on the Internet protocols. Consider the following statement: webpages Jolene navigates to "https://www.nationaltrust.org.uk/" in her browser and sees this front page: The
slideshow JavaScript library The IPv6 protocol is the most recent version of the Internet Protocol (IP). Each IPv6 address is a 128-bit number. That means there are 2^{128}(3.4 \times 10^{38}) possible addresses for Internet-connected computing devices. A startup creates a chatbot that uses artificial intelligence algorithms to have therapeutic conversations with users. Launching the chatbot in multiple platforms (Android, iOS, and Facebook) on the same day Amazon describes their web services platform like this: It continues operating when experiencing traffic surges. Pv4 is the first standardized version of the Internet Protocol. IPv4 is gradually being replaced by IPv6, a more scalable version of the protocol. Each IPv4 address is a 323232-bit number. That's enough space for 2^{32} (4.3 \times 10^{9} possible addresses for Internet-connected computing devices (less than the current number of Internet-connected devices). Every year during the Christmas holiday, Google hosts a website to help track the path of Santa around the globe. The website goes from zero traffic to millions of visitors in a small period of time. The SREs can use Google-owned machines to simulate large amounts of visitors on the website and monitor the website to see how it reacts. What does it mean for a system to be scalable? A scalable system can handle an increasing number of users. The TV show Silicon Valley
revolved around a startup and their attempt to bring a new product to market. They can continue functioning even if there is a significant increase in the number of operations they must perform. In
what situations does a computer use multiple Internet protocols to send a message? 1,2,3 Which of these is not a protocol that powers the Internet? API, PII Which description of Internet communication is accurate? Internet communications are powered by many protocols. One of the most important protocols is the Internet Protocol (IP) since it describes both addressing and routing. Other protocols add layers of functionality on top of that protocol, such as TCP for reliable transmission. Which of these is a way that the Internet Protocol (IP) contributes to Internet communications? It describes how to route packets of data around the Internet, from router to router, based on a destination address. OR It describes an addressing scheme to uniquely identify each node on the Internet. OR It describes a way to uniquely identify computing devices that are connected to the Internet so that messages can be sent to them. When a computer loads a webpage, it sends a message to a web
server over the Internet. It always uses multiple protocols. How does the Internet Protocol (IP) fit into the Internet technology suite? The Internet Protocol is a protocol used in all Internet communication, but other protocols are also used. The following
passage describes the Internet but contains a missing adjective: nonproprietary What is true about the computing devices exchanging data over the Internet? All the computing devices that are exchanging data over the Internet are following the rules of the Internet Protocol (IP). Which of these situations describes the invention of a networking protocol? Leighton proposes a set of rules that describe a way for computers to send data on low-bandwidth connections and lists them in a document. Multiple network administrators agree to the rules and implement them. Which of these are a requirement for a computing device to access the Internet?
1 The following passage describes the Internet but contains a missing adjective: open The Internet Protocol (IP) includes a rule that each message must include a source IP address and a destination IP address. 3 In the field of computer networks, what is a protocol? A documented set of rules that describe the behavior of devices in the computer network Which of these are a requirement for a computer to access the Internet? 3 Which of these are a requirement for a computer to access the
Internet? 2 Imagine that you wanted to build a directory that listed the contents of the World Wide Web. A Webpage ... ... Students also viewedKhan Academy APCSP 1/21/2021126 terms msabiopaese Unit: The Internet22 terms Danny9375 Khan Academy The Internet Study List76 terms GummyD17 AP CSP Final Practice10 terms nutella7863 Sets found in the same folderKhan Academy APCSP 1/21/2021126 terms msabiopaese CSP Study Guide34 terms Alafe7 AP CSP Khan Academy and Quia Review52 terms OliviaArmstrong2020 AP CSP Semester 1 Exam199 terms Ella_Patel4 Other sets by this creatorThe Cell Cycle45 terms sristidatta17 Cell Cycle questions40 terms sristidatta17 Cell Cycle Review30 terms sristidatta17 sports medicine review102 terms sristidatta17 Verified questions
biology Name an organism that occupies each of the following trophic levels: the producer trophic level, the second trophic level, and the third trophic level. Verified answer
engineering A 15-ft-long submarine is intended to travel at $15\ \mathrm{mi} / \mathrm{h}$. If it is tested in a wind tunnel using a $1$-ft-long model, calculate the speed of the air at the same temperature of $40^{\circ} \mathrm{F}$. Is this reasonable? Verified answer
computer science (Geometry: area of a hexagon) The area of a hexagon can be computed using the following formula ( $\mathrm{s}$ is the length of a side): $$ \text { Area }=\frac{6 \times s^2}{4 \times \tan \left(\frac{\pi}{6}\right)} $$ Write a program that prompts the user to enter the side of a hexagon and displays its area. Here is a sample run: ``` Enter the side: 5.5 The area of the hexagon is 78.59 ``` Verified answer anatomy What is the function of the ductus venosus? Verified answer Recommended textbook solutionsFundamentals of Database Systems7th EditionRamez Elmasri, Shamkant B. Navathe 687 solutions
Service Management: Operations, Strategy, and Information Technology7th EditionJames Fitzsimmons, Mona Fitzsimmons 103 solutions
Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions Service Management: Operations, Strategy, and Information Technology7th EditionJames Fitzsimmons, Mona Fitzsimmons 103 solutions Other Quizlet setsChapter 515 terms Kool_Kim Copyright Law Test 138 terms carolined1998 Wrecker Regulation14 terms fussellgarrett What is relationship between web and Internet?The Internet, linking your computer to other computers around the world, is a way of transporting content. The Web is software that lets you use that content…or contribute your own. The Web, running on the mostly invisible Internet, is what you see and click on in your computer's browser.
Which of the following best explains the relationship between the Internet and the World Wide Web?Which of the following best describes the relationship between the World Wide Web and the Internet? The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet.
Is is true that Internet and the World Wide Web are the same support your answer through private comment *?As we've seen, the internet and the web are important to each other, but they are not the same. The internet is the infrastructure that connects computer networks together, while the World Wide Web is a system of organizing information that's accessible through the internet.
How does the World Wide Web work?The web browser connects to the web server and sends an HTTP request (via the protocol stack) for the desired web page. The web server receives the request and checks for the desired page. If the page exists, the web server sends it. If the server cannot find the requested page, it will send an HTTP 404 error message.
|