MIS Cronk 7
The WiMax standard can transmit up to a distance of approximately:
30 miles.
Which of the following is the best description of a protocol in a telecommunications network architecture?
A standard set of rules and procedures for control of communications in a network
The most common web servers today are:
Apache HTTP Server and Microsoft IIS.
The most appropriate wireless networking standard for creating PANs is:
Bluetooth.
A network that spans a college or corporate facility is called a:
CAN
Instant messaging is a type of ________ service.
Chat
The Internet is based on which three key technologies?
Client/server computing, packet switching, and the development of communications standards for linking networks and computers
What service converts IP addresses into more recognizable alphanumeric names?
DNS
Which signal types are represented by a binary waveform?
Digital
In TCP/IP, IP is responsible for which of the following?
Disassembling and reassembling packets during transmission
Which of the following is not one of the top five search engines?
Computer networks are based on the same principles as telephone networks.
False
NFC tags are always passive.
False
RFID technology is being gradually replaced by less costly technologies such as WSNs.
False
Which digital cellular standard is used widely throughout the world except the United States?
GSM
Web browser software requests web pages from the Internet using which of the following protocols?
HTTP
Which organization manages the domain name system of the Internet?
ICANN
A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers.
ISP
Macy's Pick to the Last Unit system, described in the chapter-opening case, is an example of which of the following?
IoT application
4G networks use which of the following standards?
LTE and WiMax
Which type of network is used to connect digital devices within a city or metropolitan area?
MAN
Based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business?
Managing the supply chain
Which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network?
Modem
Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations?
Packet switching
Which of the following is not a characteristic of packet switching?
Packet switching requires point-to-point circuits.
Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server?
Peer-to-peer
Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents?
Peer-to-peer network
Which of the following statements about RFID is not true?
RFIDs require line-of-sight contact to be read.
Which of the following pulls content from websites and feeds it automatically to a user's computers?
RSS
Which of the following is a device that sends packets of data through different networks assuring they go to the correct address?
Router
Which of the following can be used to help a website achieve a higher ranking with the major search engines?
SEO
________ monetizes the value of the data stored by search engines.
Search Engine Marketing
Which of the following is not a defining feature of Web 2.0?
Semantic search
On which of the following protocols is the Internet based?
TCP/IP
Which of the following statements is not true about search engines?
There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.
A NOS must reside on all the local computers in a network.
True
A computer network consists of at least two computers.
True
A hub is a networking device that sends packets of data to all other devices on the network.
True
Apple Pay uses an RFID-related technology called near field communication.
True
Bandwidth refers to the range of frequencies that can be transmitted by a telecommunications channel.
True
By 2018, it is estimated that more than 200 million Americans will use mobile search.
True
Client/server computing has largely replaced centralized mainframe computing.
True
Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.
True
Computer networks that use packet switching are much more efficient than telephone networks that use circuit switching.
True
Digital rights activists believe differentiated pricing violates net neutrality principles.
True
Fiber-optic cable is more expensive and harder to install than wireless media.
True
In a client/server network, a network server sets the rules of communication for the network.
True
In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.
True
In addition to being an online retailer, Amazon is also a powerful product search engine.
True
Mobile search makes up more than 50% of all Internet searches.
True
TCP/IP was developed during the early 1970s to support efforts to help scientists transmit data among different types of computers over long distances.
True
The "Internet of Things" refers to a vision of a pervasive Web, in which common objects are connected to and controlled over the Internet.
True
The Domain Name System (DNS) converts domain names to IP addresses.
True
The Internet of Things is based on billions of Internet-connected sensors throughout the physical world.
True
Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.
True
VoIP technology delivers voice information in digital form using packet switching.
True
Web 3.0 is an effort to add a layer of meaning to the existing web in order to reduce the amount of human involvement in searching for and processing web information.
True
Wikis allow visitors to change or add to the original posted material.
True
Which process is used to protect transmitted data in a VPN?
Tunneling
________ integrate disparate channels for voice communications, data communications, instant messaging, email, and electronic conferencing into a single experience.
Unified communications
The 802.11 set of standards is known as:
Wi-Fi.
A network that covers entire geographical regions is most commonly referred to as a(n):
Wide Area Network
A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.
access point
T1 lines:
are high-speed, leased data lines providing guaranteed service levels.
In the domain name "http://books.azimuth-interactive.com", which element is the second-level domain?
azimuth-interactive.com
All of the following are physical components of an RFID system except:
bar codes.
The total amount of digital information that can be transmitted through any telecommunications medium is measured in:
bps
The telephone system is an example of a ________ network.
circuit-switched
IPv6 has been developed in order to:
create more IP addresses.
Bandwidth is the:
difference between the highest and lowest frequencies that can be accommodated on a single channel.
A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits.
digital
Client/server computing is a:
distributed computing model where clients are linked to one another through a network that is controlled by a network server computer.
Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication.
eight
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as:
hotspots.
Shopping bots use ________ software for searching the Internet.
intelligent agent
A VPN:
is an encrypted private network configured within a public network.
The backbone networks of the Internet are typically owned by long-distance telephone companies called:
network service providers.
Digital subscriber lines:
operate over existing telephone lines to carry voice, data, and video.
Predictive search in Google's search engine:
predicts what you are looking for as you enter words into the query box.
Wireless sensor networks (WSNs) are used for the following tasks except:
processing consumer transactions.
The concept of a future web in which it is commonplace for everyday objects to be connected, controlled, or monitored over the Internet is called:
the Internet of Things.
The domain .gov is a(n):
top-level domain.
Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n):
uniform resource locator.
A(n) ________ is software for locating and managing stored web pages.
web server