Dynamics- chapter 7

¡Supera tus tareas y exámenes ahora con Quizwiz!

Select the two benefits of network convergence.

-Multiple services offered such as Internet access, VoIP, and IPTV. -One provider offering one bill, one point of contact, one customer support center.

Select three ways a network provides opportunities to a company..

-Tap potential customers online without hiring expensive marketing companies -Lowered entry barriers for start-ups -Order parts electronically from suppliers

Select the two accurate statements about mobility and wireless communications.

-Wireless refers to any type of operation accomplished without the use of a hard-wired connection. -Mobile means the technology can travel with the user.

What is a worldwide gap giving advantage to those with access to technology?

Digital Divide

__________-speed Internet cable connections provide Internet access using a cable television company's infrastructure and a special cable modem.

High

What is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, web publishing, and the support of business processes?

Intranet

Select three measures of bandwidth.

Kilobits, Megabits, Gigabits

What is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server?

Peer-to-peer network

A(n) __________ is software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons.

Proxy

___________ (Please use the acronym) is a standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remain private.

SSL

What is a standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remain private?

Secure sockets layer(SSL)

Select the two primary challenges associated with a network.

Security issues Social, ethical, and political issues

__________ -passive RFID tags use a battery to run the microchip's circuitry, but communicate by drawing power from the RFID reader.

Semi

What is an encryption algorithm designed to protect wireless transmission data?

WEP

What is the computer or network device that serves as an interface between devices and the network?

Access Point

What occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention?

Asset Tracking

What measures network performance and represents the maximum amount of data that can pass from one point to another in a unit of time?

Bandwith

What is the smallest element of data and has a value of either 0 or 1?

Bit

__________ is a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices.

Bluetooth

___________ is a high-speed Internet connection that is always connected.

Broadband

Select two terms that represent a type of digital modem used with high-speed cable Internet service.

Broadband modem and cable modem

Select the four types of Internet access technologies.

Cable Dial-up T1 DSL

What is a type of digital modem used with high-speed cable Internet service?

Cable Modem

_________ is the science and art of making an illustrated map or chart.

Cartography

____________ RFID tags use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip.

Chipless

Network ___________ is the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures.

Convergence

_________ (one word) Name Systems to convert IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions.

Domain

_________ (Please use the acronym) is the time remaining before reaching a destination using the present speed and is typically used for navigation applications.

ETE

What occurs when paper maps are laid edge to edge and items that run across maps but do not match are reconfigured to match?

Edge Matching

Select three terms that represent the event that occurs when paper maps are laid edge to edge and items that run across maps but do not match are reconfigured to match.

Edge matching Warping Rubber sheeting

What is an extension of an intranet that is available only to authorized outsiders, such as customers, partners, and suppliers?

Extranet

A(n) ____________ stores, views, and analyzes geographic data creating, multidimensional charts or maps.

GIS

What links business assets to a centralized system where they can be tracked and monitored over time?

GIS map automation

__________ is a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find.

Geocache

A(n) ________ is a round coin-sized object, is uniquely numbered and hidden in geocache.

Geocoin

Select the three terms that identify the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more.

Geographic information Spatial data Geospatial data

What is a satellite-based navigation system providing extremely accurate position, time, and speed information?

Global positioning system

What represents a north/south measurement of position?

Latitude

A(n) ___ area network connects a group of computers in close proximity, such as in an office building, school, or home.

Local (LAN)

Select the three network categories.

MAN WAN LAN

Select three common uses of GIS in a business.

Mapping quantities Sending information alerts Finding what is nearby

What is a large computer network usually spanning a city?

Metropolitan area network

Regional service providers offer Internet service by connecting to __________ (use acronym), but they also can connect directly to each other.

NSPs

__________ service providers are private companies that own and maintain the worldwide backbone that supports the Internet.

National

Select the five primary networking elements.

Network access technologies Network providers Network protocols Network categories Network convergence

A(n) _____ is a standard that specifies the format of data as well as the rules to be followed during transmission.

Protocol

File transfer ___________ is a simple network protocol that allows the transfer of files between two computers on the Internet.

Protocol

Select the three primary wireless business applications.

RFID GIS GPS

Select the two terms that represent a transmitter/receiver that reads the contents of RFID tags in the area.

RFID interrogator RFID reader

What offers Internet service by connecting to NSPs, but they also can connect directly to each other?

Regional Service Providers

What is a combination of HTTP and SSL to provide encryption and secure identification of an Internet server?

SHTTP or HTTPS

What identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more?

Spatial data

An RFID ________ is an electronic identification device that is made up of a chip and antenna

Tag

What allows users to work from remote locations, such as home or a hotel, using high-speed Internet to access business applications and data?

Telecommuting

____ control protocol/Internet protocol (TCP/IP) provides the technical foundation for the public Internet as well as for large numbers of private networks.

Transmission

What is the integration of communication channels into a single service?

Unified communications

Companies can establish direct private network links among themselves or create private, secure Internet access, in effect a "private tunnel" within the Internet, called a _________ private network.

Virtual

Select two terms that represent users working from remote locations, such as home or a hotel, using high-speed Internet to access business applications and data.

Virtual workforce Telecommuting

What includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles, along with additional equipment required to send out a Wi-Fi signal?

Wi-Fi infrastructure

What is a communications technology aimed at providing high-speed wireless data over metropolitan area networks?

WiMAX

A(n) ____ area network spans a large geographic area such as a state, province, or country.

Wide (WAN)

What enables devices to connect to a wireless network to communicate with each other?

Wireless access point

Select the four wireless communication network categories

Wireless wide area networks Wireless metropolitan area networks Personal area networks Wireless local area networks

GIS map ___________ links business assets to a centralized system where they can be tracked and monitored over time.

automation


Conjuntos de estudio relacionados

Chapter 52: Assessment and Management of Patients With Endocrine Disorders

View Set

DBMS - Database Management System

View Set

Urinalysis & Body Fluids: Safety & QA

View Set

MKTG 301 Chapters 1-4 Practice Questions

View Set

Chapter 7 Assessment & Intervention for Emerging Language"

View Set

Understanding the Concept of a Limit (Assignement)

View Set

Ch. 2 Smartbook - Managing Public Issues & Stakeholder Relationships

View Set