History of the Internet Quiz
30 Questions
0 Views

History of the Internet Quiz

Created by
@TopsSanDiego

Questions and Answers

What is one significant limitation of the Internet mentioned in the content?

  • Strong cybersecurity measures
  • Running out of IPv4 addresses (correct)
  • Insufficient IPv6 addresses
  • Excessive bandwidth availability
  • Which organization is responsible for setting standards for web site construction?

  • W3C (correct)
  • IANA
  • ISP
  • ICANN
  • Which technology is primarily still in use that limits bandwidth for many users?

  • Telephone lines (correct)
  • Satellite connections
  • Fiber optic cables
  • Broadband networks
  • What is a key characteristic of the semantic web?

    <p>Supports artificial intelligence capabilities</p> Signup and view all the answers

    What is one of the ongoing applications of the semantic web?

    <p>Intelligence gathering for antiterrorism</p> Signup and view all the answers

    What does cloud computing primarily provide to users?

    <p>Remote resources for storage and processing</p> Signup and view all the answers

    What is a primary concern associated with the development of the Internet as mentioned?

    <p>Internet backbone capacity for users</p> Signup and view all the answers

    When did the construction of the semantic web begin?

    <p>2001</p> Signup and view all the answers

    What key technology was first used in ARPAnet to facilitate long-distance communication?

    <p>Packet switching</p> Signup and view all the answers

    Which of the following events marked the separation of the military portion of ARPAnet to form MILNet?

    <p>The adoption of TCP/IP protocols</p> Signup and view all the answers

    What was the first significant web browser launched in 1994 that contributed to the creation of the World Wide Web?

    <p>MOSAIC</p> Signup and view all the answers

    In which year did the first email get sent?

    <p>1972</p> Signup and view all the answers

    What protocol was added by the UK in 1974 to facilitate network communication?

    <p>X.25</p> Signup and view all the answers

    What was the major outcome of the push in the 1980s to connect US universities to the Internet?

    <p>Increase in the number of computer hosts to tens of thousands</p> Signup and view all the answers

    What function do routers perform in a networked environment?

    <p>Transmit data packets across networks</p> Signup and view all the answers

    What was a significant factor contributing to the explosive growth of Internet users in the 1990s?

    <p>Adoption of Windows 95 operating system</p> Signup and view all the answers

    What method does the Internet primarily utilize to route messages across networks?

    <p>Packet Switching</p> Signup and view all the answers

    What device is responsible for directing packets from one network to another?

    <p>Router</p> Signup and view all the answers

    What is the primary function of the Domain Name System (DNS)?

    <p>To translate IP aliases into IP addresses</p> Signup and view all the answers

    Which of the following is NOT a networking protocol?

    <p>MIME</p> Signup and view all the answers

    How many bits are used in an IPv6 address?

    <p>128 bits</p> Signup and view all the answers

    What kind of networking attack involves flooding a server with requests?

    <p>Denial of Service</p> Signup and view all the answers

    In which year did Morris' Internet Worm cause widespread infiltration of Unix machines?

    <p>1988</p> Signup and view all the answers

    What does NAT (Network Address Translation) primarily do with IP addresses?

    <p>Converts external IPs to internal IPs</p> Signup and view all the answers

    What is the purpose of TCP/IP handshaking?

    <p>To establish a reliable connection between two machines</p> Signup and view all the answers

    Which of the following is a characteristic of Class C networks?

    <p>Has 256 individual addresses</p> Signup and view all the answers

    Which tool is used to monitor the reachability of a remote machine in a network?

    <p>Ping</p> Signup and view all the answers

    Which of the following is an example of ARP poisoning?

    <p>Modifying a switch's address table</p> Signup and view all the answers

    Which file in a Linux system is used for IP alias to address mapping?

    <p>/etc/hosts</p> Signup and view all the answers

    What does the 'SYN' packet signify in TCP/IP handshaking?

    <p>Establishment of a connection</p> Signup and view all the answers

    Study Notes

    History of the Internet

    • 1968: Formation of ARPAnet by four research organizations under the Department of Defense for long-distance communication.
    • First message sent on October 29, 1969, using packet switching technology.
    • 1970: 9 computers connected; number grew to 40 by 1973.
    • 1971: Introduction of email.
    • 1973: FTP implemented; connectivity established between Hawaii and Norway via satellites.
    • 1983: ARPAnet military portion separated into MILNet, with the network renamed to the Internet using TCP/IP protocol.
    • 1994: Creation of the first web browser, MOSAIC, marking the start of the World Wide Web.
    • 2000s: Smartphones and tablets emerged, leading to billions of internet users and trillions of web documents.

    Internet Users

    • Growth of internet users from thousands in the early stages to millions by the 1990s.
    • Control and addressing of the Internet transitioned towards IPv6, offering a vast number of unique addresses.

    Network Protocols and Functionality

    • TCP/IP includes a three-way handshake method for establishing communication between computers.
    • Messages use port addresses for application handling; each port is designated for specific protocols like HTTP (80) and FTP (20).
    • Network Address Translation (NAT) allows external IP addresses to map to internal addresses, enhancing privacy and addressing limitations.

    Network Software and Utilities

    • Telnet and SSH enable remote computer logins; SSH provides encrypted communication.
    • Ping and Traceroute diagnose connectivity and map the route taken by packets across networks.
    • HTTP serves as the standard protocol for web communication; FTP was the initial standard for file transfers.

    IP Addresses and Domain Names

    • Domain Name System (DNS) translates IP aliases into actual IP addresses, easing user navigation.
    • Local DNS servers assist in resolving domain names without needing to contact every DNS server globally.

    Linux Network Management

    • Critical Linux commands include starting network services, viewing IP information, and managing access through specific configuration files, such as /etc/hosts.

    Network Security

    • Firewalls filter incoming and outgoing traffic based on set rules.
    • Antiviral software scans for malicious files, while intrusion detection systems monitor for unauthorized access.

    Types of Network Attacks

    • Denial-of-Service attacks overwhelm servers with requests, causing failures.
    • IP spoofing allows attackers to masquerade as other devices.
    • SQL injections manipulate backend databases for data access and manipulation.

    Morris’ Internet Worm

    • Created by Robert Morris in 1988, it exploited Unix vulnerabilities and infected approximately 6,000 systems within three days.
    • Morris claimed his intent was to raise awareness of security flaws in Unix.

    The Internet Framework

    • Operates on packet switching, routing mechanisms, and the use of IP addresses alongside DNS for mapping.
    • Each packet of data follows its routing path, often taking different routes to reach the destination.

    Control and Limitations

    • In the 1990s, control of the Internet was handed from the government to commercial entities.
    • Limitations include the depletion of IPv4 addresses and inadequate infrastructure for an increasing user base.

    Semantic Web

    • Aim to enhance the World Wide Web by adding AI capabilities for improved data access and querying.
    • Semantic web initiatives focus on creating intelligent agents to assist with information processing and problem-solving.

    Cloud Computing

    • Provides remote access to computing resources, enabling storage and processing via the internet.
    • Represents a shift from traditional computing to resource accessibility through various devices, embodying a modern computing infrastructure.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on the origins and key milestones in the development of the Internet. From the inception of ARPAnet to its expansion in the early 70s, this quiz will cover significant events and technologies that shaped the online world we know today.

    More Quizzes Like This

    Use Quizgecko on...
    Browser
    Browser