CIS 761 Test 7
Web sites that enable users to share information, collaborate, and create new services and content are called ________ sites.
2nd generation
The WiMax standard can transmit up to a distance of approximately
30 miles
Which of the following is the first generation of cellular systems suitable for watching videos?
4g
In a telecommunications network architecture, a protocol is
A standard set of rules and procedures for control of communications in a network.
A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.
Access Point
The most common Web server today is
Apache HTTP server
What are the four layers of the TCP/IP reference model?
Application Layer 2. Transport Layer 3. Internet Layer 4. Network Interface Layer
What service converts IP addresses into more recognizable alphanumeric names?
DNS
Which of the following is not one of the top five search engines?
An NOS must reside on a dedicated server computer in order to manage a network.
False
Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching.
False
RFID technology is being gradually replaced by less costly technologies such as WSNs.
False
TCP/IP was developed in the 1960s to enable university scientists to locate other computers on the Internet.
False
Which digital cellular standard is used widely throughout the world except the United States?
GSM
Which organization helps define the overall structure of the Internet?
IBM
A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers.
ISP
Which type of network is used to connect digital devices within a half-mile or 500-meter radius?
LAN
"Predictive search" in Google's search engine
Predicts what you are searching
Which of the following statements about RFID is not true?
RFIDs require line-of-sight contact to be read.
What technology allows people to have content pulled from Web sites and fed automatically to their computers?
RSS
Which protocol is the Internet based on?
TCP/IP
More than 50% of U.S. Internet users access the Internet via mobile devices.
True
Wikis allow visitors to change or add to the original posted material.
True
Which process is used to protect transmitted data in a VPN?
Tunneling
4G networks use which standards?
UMB and LTE??
In the domain name "http://books.azimuth-interactive.com", which element is the second-level domain?
azimuth-interactive
All of the following are physical components of an RFID system except
bar code
The most appropriate wireless networking standard for creating PANs is
bluetooth
The total amount of digital information that can be transmitted through any telecommunications medium is measured in
bps
The telephone system is an example of a ________ network.
circuit switched
IPv6 is being developed in order to
create more IP addresses
A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits.
digital
Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication.
eight
The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes.
false
T1 lines
high speed, leased data lines providing guaranteed service levels
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as
hotspots
Web browser software requests Web pages from the Internet using which protocol?
http
shopping bots use
intelligent agent
A VPN
is an encrypted connection between private networks over a public network such as the Internet.
Based on your reading of the examples in the chapter, what would be the best use of RFID for a business?
managing the supply chain---
To use the analog telephone system for sending digital data, you must also use
modem
The backbone networks of the Internet are typically owned by long-distance telephone companies called
network service providers
digital subscriber lines
operate over existing telephone lines to carry voice, data, and video.
Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server?
peer to peer
A(n) ________ is a device that forwards packets of data through different networks, ensuring that the data gets to the right address.
router
________ monetizes the value of the data stored by search engines.
search marketing engine
The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n)
switch
The concept of a future Web in which it is commonplace for everyday objects to be connected, controlled or monitored over the Internet is called
the web of things??
The child domain of the root is the
top level tier
In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.
true
VoIP technology delivers voice information in digital form using packet switching.
true
Which process is used to protect transmitted data in a VPN?
tunneling
________ integrate disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience.
unified communication
A(n) ________ is software for locating and managing stored Web pages.
web server
The 802.11 set of standards is known as
wifi
Which of the following statements is not true about search engines?
There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.
Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.
True
Mobile search makes up at least 50% of all Internet searches.
True