ch 7
Which signal types are represented by a continuous waveform? Optical RFID Laser Analog Digital
Analog
A network that spans a college or corporate facility is called a: MAN. CAN. LAN. WAN. WSN.
CAN.
A network that spans a college or corporate facility is called a: WAN. CAN. WSN. MAN. LAN.
CAN.
What service converts natural language names to IP addresses? DNS HTML FTP HTTP IP
DNS
In TCP/IP, IP is responsible for which of the following? Disassembling and reassembling packets during transmission Breaking messages down into packets Sequencing the transfer of packets Establishing an Internet connection between two computers Moving packets over the network
Disassembling and reassembling packets during transmission
Which of the following is not one of the top five search engines? Google Yahoo Facebook Microsoft Bing Baidu
Which digital cellular standard is used widely throughout the world except the United States? 4G CDMA GSM LTD WLAN
GSM
Which one of the following statements is not true? W3C determines programming standards for the Internet. ICANN manages the domain name system. The Internet must conform to laws where it operates. The Internet backbone is owned by the federal government in the United States. The IAB establishes the overall structure of the Internet.
The Internet backbone is owned by the federal government in the United States.
Which process is used to protect transmitted data in a VPN? Packet-switching Tunneling Chaining VOIP PPP
Tunneling
In the domain name "http://books.azimuth-interactive.com", which element is the second-level domain? none; there is no second-level domain in this name books.azimuth-interactive azimuth-interactive.com com books
azimuth-interactive.com
The total amount of digital information that can be transmitted through any telecommunications medium is measured in: RPMs. gigaflops. baud. bps. Hertz.
bps.
The telephone system is an example of a ________ network. peer-to-peer wireless circuit-switched client/server packet-switched
circuit-switched
Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication. fifteen two twenty five eight
eight
Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): root domain. child domain. third-level domain. IP address. uniform resource locator.
uniform resource locator.
A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers. ISP RSS WAN NFP FTP
ISP
4G networks use which of the following standards? LTE and LTD GSM and LTD CDMA and PAN T-Mobile and AT&T LTE and WiMax
LTE and WiMax
A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits. digital analog broadband modulated T1
digital
Which type of application does Macy's use to track items for sale on store shelves? Web 3.0 application RFID application BLE application GPS application IoT application
RFID application
Which of the following is a device that sends packets of data through different networks assuring they go to the correct address? NIC Modem Hub Router Switch
Router
________ integrate disparate channels for voice communications, data communications, instant messaging, email, and electronic conferencing into a single experience. Modems Virtual private networks Wireless networks Unified communications Intranets
Unified communications
The 802.11 set of standards is known as: Wi-Fi. WSN. WLAN. WAN. WiMax.
Wi-Fi.
Bandwidth is the: total number of bytes that can be sent through a medium per second. difference between the highest and lowest frequencies that can be accommodated on a single channel. number of cycles per second that can be sent through a medium. geographical distance spanned by a network. number of frequencies that can be broadcast through a medium.
difference between the highest and lowest frequencies that can be accommodated on a single channel.
A VPN: is a proprietary networking service technology developed by individual corporations. provides secure, encrypted communications using Telnet. is more expensive than a dedicated network. is an Internet-based service for delivering voice communications. is an encrypted private network configured within a public network.
is an encrypted private network configured within a public network.
Digital subscriber lines: are very-high-speed data lines typically leased from long-distance telephone companies. have up to twenty-four 64-Kbps channels. operate over coaxial cable lines to deliver Internet access. operate over existing telephone lines to carry voice, data, and video. are assigned to every computer on the Internet.
operate over existing telephone lines to carry voice, data, and video.
Which of the following statements about RFID is not true? RFIDs transmit only over a short range. RFID tags and antennas come in a variety of shapes and sizes. RFIDs use an antenna to transmit data. Microchips embedded in RFIDs are used to store data. RFIDs require line-of-sight contact to be read.
RFIDs require line-of-sight contact to be read.
________ monetizes the value of the data stored by search engines. WiMax TCP/IP IoT RSS Search engine marketing
Search engine marketing
T1 lines: operate over existing telephone lines to carry voice, data, and video. have up to twenty-four 64-Kbps channels. operate over coaxial lines to deliver Internet access. do not provide guaranteed service levels, but simply "best effort." are high-speed, leased data lines providing guaranteed service levels.
are high-speed, leased data lines providing guaranteed service levels.
All of the following are physical components of an RFID system except: radio transmitters. bar codes. antennas. a stationary or handheld device. tags.
bar codes.
The Internet of Things (IoT) refers to: billions of Internet-connected sensors. the idea that nearly everyone in the United States is connected to the Internet. the role of computer processors in automobiles. the idea that cars, planes, factories, and government are all connected to the Internet. the fact that nearly everyone has some kind of computer today.
billions of Internet-connected sensors
IPv6 has been developed in order to: create more IP addresses. update the packet transmission protocols for higher bandwidth. support Internet2. allow for different levels of service. reduce excess IP addresses.
create more IP addresses.
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as: hotspots. netcenters. wireless hubs. hot points. touch points.
hotspots.
Shopping bots use ________ software for searching the Internet. intelligent agent SEO Web 3.0 comparison Web 2.0
intelligent agent
The backbone networks of the Internet are typically owned by long-distance telephone companies called: regional network providers. backbone providers. enhanced service providers. network service providers. internet bulk providers.
network service providers.
What are the four layers of the TCP/IP reference model? Physical, Application, Transport, and Network Interface Physical, Application, Internet, and Network Interface Application, Transport, Internet, and Network Interface Application, Hardware, Internet, and Network Interface Software, Hardware, Network Interface, Internet
Application, Transport, Internet, and Network Interface
Which of the following can be used to help a website achieve a higher ranking with the major search engines? SEM RSS SEO IAB VPN $
SEO
The WiMax standard can transmit up to a distance of approximately: 500 meters. 5 miles. 30 miles. 30 meters. 70 miles.
30 miles
Which of the following statements about 5G is true? 5G will be able to transmit data in the gigabit range. 5G is built on the foundation of 4G networks. 5G will transmit data in the megabyte range. 5G will have longer transmission delays. 5G is not currently being developed by large Internet network providers.
5G will be able to transmit data in the gigabit range.
Which of the following is the best description of a protocol in a telecommunications network architecture? A standard set of rules and procedures for control of communications in a network A device that handles the switching of voice and data in a local area network The main computer in a telecommunications network A pathway through which packets are routed A communications service for microcomputer users
A standard set of rules and procedures for control of communications in a network
The most common web servers today are: WebSTAR and Netscape Server. Netscape Server and Apache HTTP. Apache HTTP Server and Microsoft IIS. Microsoft IIS and IBM HTTP Server. IBM HTTP Server and Apache HTTP Server.
Apache HTTP Server and Microsoft IIS.
Web browser software requests web pages from the Internet using which of the following protocols? DNS URL FTP HTML HTTP
HTTP
Which organization manages the domain name system of the Internet? ICANN The Department of Commerce (U.S.) IAB None (no one "owns" the Internet) W3C
ICANN
Which type of network is used to connect digital devices within a city or metropolitan area? WAN Wi-Fi LAN MAN SAN
MAN
Based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business? Managing the supply chain Lowering network costs Improving employee engagement Enabling client communication Logging transactions
Managing the supply chain
Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations? Multiplexing Packet switching Packet shifting ATM Packet routing
Packet switching
Which of the following is not a characteristic of packet switching? Packets are routed through many different paths. Packets travel independently of each other. Packets include data for checking transmission errors. Packets are reassembled into the original message when they reach their destinations. Packet switching requires point-to-point circuits.
Packet switching requires point-to-point circuits.
Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server? Peer-to-peer Windows domain network MAN LAN Wireless
Peer-to-peer
Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents? MAN Peer-to-peer network WAN SAN Domain-based LAN
Peer-to-peer network
Which of the following pulls content from websites and feeds it automatically to users' computers? RSS HTTP Bluetooth IPv6 FTP
RSS
Which of the following statements is not true about search engines? Users are increasingly using search engines on mobile devices. There are hundreds of search engines vying for user attention, with no clear leader having yet emerged. They are arguably the Internet's "killer app." They are monetized almost exclusively by search engine marketing. They have solved the problem of how users instantly find information on the Internet.
There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.
Instant messaging is a type of ________ service. email wireless cellular chat network
chat
Predictive search in Google's search engine: uses a tracking service and cookies on your browser to predict search results. uses a semantic approach to predict what you are looking for. predicts what you are looking for as you enter words into the query box. uses a knowledge graph of what similar people searched on to predict your search interests. maintains a history of your searches and then predicts what you will search on next.
predicts what you are looking for as you enter words into the query box.
Wireless sensor networks (WSNs) are used for the following tasks except: processing consumer transactions. detecting radioactive materials. monitoring machines. identifying vehicles for trucking firms. protecting property.
processing consumer transactions.
The concept of a future web in which it is commonplace for everyday objects to be connected, controlled, or monitored over the Internet is called: a 3-D Web. the Internet of Things. Web 2.0. Internet2. the Semantic Web.
the Internet of Things.
The domain .gov is a(n): network domain. third level domain. top-level domain. Internet root domain. host domain.
top-level domain.
A(n) ________ is software for locating and managing stored web pages. modem web server router net server hub
web server
A network that covers entire geographical regions is most commonly referred to as a(n): peer-to-peer network. local area network. metropolitan area network. wide area network. intranet.
wide area network.
The Internet is based on which three key technologies? TCP/IP, HTTP, and packet switching Client/server computing, packet switching, and HTTP Client/server computing, packet switching, and the development of communications standards for linking networks and computers Email, instant messaging, and newsgroups TCP/IP, HTML, and HTTP
Client/server computing, packet switching, and the development of communications standards for linking networks and computers
Which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network? TCP/IP DSL Modem Local area network Twisted wire
Modem
A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub. WiMax receiver hub hotspot access point RFID receiver
access point