Unit 4: How the Internet Works

Lab 1: Computer Networks

4.1.1
Which of the following is not an advantage of storing data using cloud computing?
Prevents loss of data due malfunction of user’s personal computer.
Easy to scale up from individual use to implementation by large companies.
Has potential to be environmentally friendly due to many users efficiently sharing large systems and resources.
Improved security and privacy over storing data on a personal computer.
4.1.2
graph of a network with a sender and a receiver at each end and multiple connections among multiple notes between them In this model of a network, what is the minimum number of nodes (connection points) that can stop working before the sender and the receiver can't communicate? (Other than the sender or the receiver themselves, of course.)
1
2
3
4
5
4.1.2
graph of a network with a sender and a receiver at each end and multiple connections among multiple notes between them In the same model network, what is the maximum number of nodes that can fail and still let Sender and Receiver communicate?
10
9
8
7
6

Lab 2: Cybersecurity

4.2.5
Which of the following are existing vulnerabilities of the Internet, according to experts?
A physical attack that involves cutting fiber-optic cables.
Attacking electrical systems that control the energy grid.
Eroding the trust and confidence that the general public has in their online privacy and secure online transactions.

Lab 4: Data Representation and Compression

4.4.1
Which of the following CANNOT be expressed using one bit?
The state of an ON/OFF switch
The value of a Boolean variable
The remainder when dividing a positive integer by 2
The position of the hour hand of a clock
4.4.2
A particular online retail company uses 9-bit binary sequences to identify each unique product for sale. Expecting to increase the number of products it sells, the company is planning to switch to 10-bit binary sequences. Which of the statements below best describes the consequence of using 10-bit sequences instead of 9-bit sequences?
Two more products can be identified uniquely.
Ten more products can be identified uniquely.
Twice as many products can be identified uniquely.
Ten times as many products can be identified uniquely.
4.4.5
A particular program uses 4 bits to represent whole numbers. When that program adds the numbers 9 and 7, the result is given as 0. Identify the best explanation of the result.
Data was corrupted during the operation due to a technical glitch.
The result was due to a round-off error.
The result was due to an overflow error.
A floating-point representation was used to approximate the result.
4.4.6
A film student records a movie on his smartphone and then saves a copy on his computer. He notices that the saved copy is of much lower image quality than the original. Which of the following could NOT be a possible explanation for the lower image quality?
The movie was saved using fewer bits per second (a lower bit rate) than the original movie.
The copy of the movie file was somehow corrupted in the process of saving.
The movie was saved using a lossy compression technique.
Whenever a file is saved from one computer to another, some information is always lost.
4.4.6
A visual artist is processing a digital image. Which of the following describe a lossless transformation from which the original image can be recovered? Choose two answers.
Creating the negative of an image, where colors are reversed (dark areas appear light).
Blurring the edges of an image.
Creating a grayscale copy of an image.
Creating a vertically flipped copy of the image.
4.4.6
For which of the following kinds of data would lossy compression be okay? Check as many as apply.
The HTML code for this web page.
Your computer's desktop picture.
A live-action movie on Netflix.
A cartoon on Netflix.
A digital book, to be read on a computer.