The Internet
Help Questions
AP Computer Science Principles › The Internet
When a computer sends a message to another computer over the Internet, which of the following is a possible outcome regarding the arrival of the message's packets?
All packets from a single message are combined into one larger packet before transmission to ensure they arrive together.
Packets may arrive out of order, arrive in order, or some packets may not arrive at all.
Packets are held at each router until all previous packets from the same message have passed through.
All packets are guaranteed to arrive, and they will always arrive in the order they were sent.
Explanation
Due to the dynamic and decentralized nature of Internet routing, packets may take different paths of varying lengths and speeds. This can cause them to arrive out of order, and network congestion or errors can cause some packets to be lost entirely. (CSN-1.C.3)
In a computer network, what is the most accurate definition of a 'path' between two computers?
A sequence of directly connected computing devices that begins at the sender and ends at the receiver.
The amount of time it takes for data to travel from the sender to the receiver.
The software application, such as an email client or web browser, used to send the data.
A single, unbroken physical connection, like a fiber-optic cable, between the two computers.
Explanation
A path in a network is the sequence of intermediate devices (like routers) and connections that data traverses to get from the source device to the destination device. It is not necessarily a single physical cable. (CSN-1.A.5)
When a packet of data travels across the Internet, it is passed from one computing device to another until it reaches its destination. What is the process of determining the path a packet takes from sender to receiver called?
Encrypting
Compressing
Broadcasting
Routing
Explanation
Routing is the process of finding a path from a sender to a receiver. Devices called routers examine packet metadata, such as the destination IP address, to decide where to forward the packet next. (CSN-1.A.6)
A user is watching a live video stream, but the connection is slow. The video player decides to lower the video quality to ensure the stream can continue without interruption. This decision is based on the current data transfer rate. What network characteristic is being measured to make this adjustment?
Protocol
Scalability
Bandwidth
Path
Explanation
Bandwidth refers to the maximum rate of data transfer across a network. When streaming video, if the available bandwidth is insufficient for high-quality video, the application may reduce the video's data rate (lower its quality) to match the available bandwidth and prevent buffering. (CSN-1.A.7)
Which of the following statements most accurately describes the relationship between the Internet and the World Wide Web (WWW)?
The World Wide Web is an older, text-based system that was replaced by the modern, graphical Internet.
The Internet and the World Wide Web are two different names for the exact same system of interconnected computers.
The World Wide Web is a system for accessing information that is built on top of the Internet's network infrastructure.
The Internet is a system of linked pages and files, while the World Wide Web is the physical network that carries the data.
Explanation
The Internet is the global network of interconnected computers. The World Wide Web is a system of linked documents, images, and other resources that uses the Internet to be transmitted. The WWW is an application that runs on the Internet. (CSN-1.D)
When a large file is sent from one computer to another over the Internet, it is broken down into smaller pieces of data. Which of the following best describes these smaller pieces and their contents?
They are called streams, each containing the entire file's data but sent through different network paths.
They are called bits, each representing a single binary digit that is sent independently to the destination.
They are called segments, each containing only metadata that establishes a direct connection before data is sent.
They are called packets, each containing a portion of the data to be transmitted and metadata for routing.
Explanation
The correct term for the smaller pieces of data is packets. Each packet contains a portion (or chunk) of the overall data, as well as metadata (like the destination IP address and sequence number) that is used by routers to direct the packet and by the destination computer to reassemble the file. (CSN-1.C.1, CSN-1.C.2)
The Internet uses protocols, such as TCP/IP, that are open and nonproprietary. What is the primary benefit of this design choice?
It prevents any single government or corporation from owning or controlling the entire Internet.
It allows devices and networks created by different manufacturers to connect and communicate with each other.
It ensures that all users experience the same connection speed regardless of their location or service provider.
It guarantees that all data transmitted over the Internet is automatically encrypted and secure from interception.
Explanation
The use of open protocols means that the rules for communication are publicly available. This allows any manufacturer to create hardware or software that is compatible with the Internet, fostering innovation and enabling the interconnection of diverse systems. (CSN-1.B.4)
A video is being streamed from a server to a user's device. The video data is encapsulated in packets for transmission. Which of the following best describes the information that is passed through the Internet during this process?
A data server which is a copy of the original server temporarily created on the user's device.
A data stream, which contains chunks of the video data encapsulated in a sequence of packets.
A single, large packet containing the entire video file and routing information.
A data protocol that contains the software needed to play the video on the user's device.
Explanation
Information, especially large files like videos, is passed through the Internet as a data stream. This stream consists of chunks of data, which are then placed into individual packets for transmission and reassembly. (CSN-1.C.1)
According to the text’s packet journey, why might packets arrive out of order, yet the message still succeeds?
HTTP forces packets to arrive alphabetically, preventing any rearrangement errors.
ISPs store packets until all networks worldwide are completely uncongested.
Packet switching allows different routes, and TCP reorders data using sequence information.
Encryption duplicates packets randomly, so order becomes irrelevant to meaning.
Explanation
This question tests AP Computer Science Principles understanding of Internet concepts, specifically packet ordering and TCP's role in ensuring data integrity. In packet-switched networks, packets may take different routes and arrive out of order due to varying network conditions, but TCP includes sequence numbers that allow the receiving system to reassemble packets in the correct order regardless of arrival sequence. According to the text's packet journey description, this design allows for flexible routing while maintaining data integrity through TCP's sequencing and reassembly mechanisms. Choice A is correct because it accurately explains that packet switching allows different routes (causing potential out-of-order arrival) and TCP reorders data using sequence information, which is how the Internet maintains message integrity despite dynamic routing. Choice B incorrectly attributes ordering to HTTP; Choice C misunderstands encryption's purpose; and Choice D presents an impractical scenario about ISP behavior. Students should understand that the Internet's design separates routing flexibility (IP layer) from reliability guarantees (TCP layer), allowing both efficiency and accuracy. Practice analyzing how different protocol layers solve different aspects of the communication challenge.
According to the text, what cybersecurity measure best matches a firewall’s role on a home or school network?
It filters incoming and outgoing traffic using rules, allowing some connections and blocking others.
It guarantees every packet arrives instantly by removing congestion from networks.
It scrambles messages into ciphertext so eavesdroppers cannot read them.
It assigns IP addresses by translating domain names into numbers.
Explanation
This question tests AP Computer Science Principles understanding of Internet concepts, specifically firewall functionality in cybersecurity. A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules, acting as a barrier between trusted internal networks and untrusted external networks. According to the text's description of cybersecurity measures, a firewall's role is to filter network traffic by examining packets and deciding whether to allow or block them based on configured rules. Choice B is correct because it accurately describes a firewall as filtering incoming and outgoing traffic using rules, allowing some connections and blocking others, which is the fundamental operation of firewall technology. Choice A describes encryption, not firewalls; Choice C describes DNS functionality; and Choice D makes unrealistic claims about network performance. Students should understand that firewalls provide access control and traffic filtering, distinct from other security measures like encryption or authentication. Practice differentiating between various cybersecurity tools and understanding how each contributes to a comprehensive security strategy.