Computer Systems & Networks
When comparing database query languages, which feature makes SQL particularly powerful for retrieving specific sets of data from large databases?
The ability to directly manipulate database tables' row and column layout.
Its declarative nature allows specifying what data is desired without describing how to retrieve it.
Compatibility with object-oriented design patterns.
Support for imperative control structures such as loops and conditionals.
What type of address is used by the Internet Protocol (IP) to send data between devices on the internet?
Port Number
Physical Address
IP Address
MAC Address
What ethical concern arises when an ISP throttles bandwidth for certain services or websites?
It increases overall internet speed since traffic is being managed more effectively.
It incentivizes users to pay for higher-tier plans with better service offerings.
It eliminates competition between ISPs as they all provide the same quality of service.
It could violate net neutrality principles by giving unfair advantages to some content providers.
In what order do packets arrive at their destination?
In any order
Out of order
They never arrive at their destination
In order
What type of network architecture does the Internet use?
Distributed network architecture
Centralized network architecture
Ring network topology
Linear bus network topology
What technology enables multiple networks to connect and communicate with each other through gateways?
Switches
Hubs
Routers
Bridges
Which scenario exemplifies an ethical dilemma created by metadata collection on user internet activities?
Targeting ads using anonymized demographic information respects user privacy and preferences equally.
Targeted advertising based on browsing history may infringe upon user's perceived right to anonymity online.
Metadata analysis improving network security protocols provides users with a direct benefit without harm.
De-identifying data before analysis ensures individual users cannot be traced or identified directly from metadata alone.

How are we doing?
Give us your feedback and let us know how we can improve
What is the purpose of using encryption algorithms in Internet communication?
To secure data transmission by converting information into a code to prevent unauthorized access.
To distribute network traffic evenly across multiple servers using load balancing methods.
To increase the speed of data transmission over long distances via compression techniques.
To filter and organize emails based on user-defined criteria and rulesets for convenience.
Which protocols are used for transporting information over a variety of networks?
TCP/IP and HTTP
TCP/IP only
TCP/IP and UDP
UDP and HTTP
How does widespread use of encryption technologies present challenges for international law enforcement agencies trying to combat cybercrime?
Deploying cryptographic solutions supports integrity and authentication in online transactions, further legitimating e-commerce activities.
Enabling end-to-end security protects sensitive consumer and corporate information, protecting against theft.
Employing cryptographic standards for the establishment of secure networks promotes trust and fairness in international trade.
Utilizing strong encryption hinders the ability of government officials to intercept criminal communications, thus hampering investigations.