MIT310; Test 2; Chapter 6
When a call is placed on a cellular phone, the signal is first transmitted to the closest , which sends a signal through landlines that dial the desired phone number. a. modem b. hotspot c. transceiver d. router
c. transceiver
The speeds of transmitting into a network are referred to as speeds. a. nodal b. download c. upstream d. downstream
c. upstream
The Greek word tele, which means " ," is part of such words as "telephone," "teleconference," and other words referring to technologies that allow communications over large distances. a. far b. path c. away d. distance
d. distance
An alternative for households that cannot obtain cable or DSL connections to the Internet is . a. optical carriers b. T1 lines c. T3 lines d. fixed wireless
d. fixed wireless
A is a common device often used as a central location to connect computers or devices to a local network. a. repeater b. bridge c. router d. switch
d. switch
Coaxial cable connects to network devices with RJ-45 plug-in connectors. • True • False
False
FTTH is point-to-point transmission between two stationary devices, usually between two buildings, as opposed to mobile wireless, in which people carry a mobile device. • True • False
False
Fiber optic technology uses electricity to represent bits. • True • False
False
IEEE 802.15 is a family of wireless protocols, collectively known as Wi-Fi. • True • False
False
Optical fibers can carry signals over relatively shorter distances compared to other media. • True • False
False
Organizations avoid telecommunications because these increase costs and office space. • True • False
False
Telecommunication companies offering fixed wireless service require franchise licenses. • True • False
False
Telecommunications has made business processes less efficient. • True • False
False
The bit rates of DSL lines usually have no relation to the distance of the subscriber's computer from the regional central office of the telephone company. • True • False
False
The simplest WAN is a satellite linkup between LANs in two different countries. • True • False
False
WiMAX is a wide area network (WAN) technology. • True • False
False
With digital subscriber line (DSL), the data is transformed into analog signals. • True • False
False
can be very tiny, about the size of a rice grain, or several square inches, depending on the amount of information they need to contain and the environment in which they are used. a. Infrared Data Association cards b. Radio Frequency Identification tags c. Bluetooth ports d. Micro tags
b. Radio Frequency Identification tags
allow Internet access to anyone within range who uses a wireless-equipped device, provided logging in is not limited by controlled access codes. a. Hotspots b. VANs c. Intranets d. VPNs
a. Hotspots
The standard was developed for devices that communicate with each other within a short range of up to 10 meters (33 feet) in the office, at home, and in motor vehicles. a. Wi-Fi b. Bluetooth c. WiMAX d. MBWA
b. Bluetooth
is a standard method of wireless communications, specifically for high-speed data transmission for mobile phones. a. Near-field communication b. Long-Term Evolution c. Bluetooth d. WiMAX
b. Long-Term Evolution
span a greater distance than LANs and usually have more complicated networking equipment for midrange communications. a. WANs (wide area networks) b. MANs (metropolitan area networks) c. peer-to-peer LANs d. PANs (personal area networks)
b. MANs (metropolitan area networks)
The number next to refers to data speed in multiples of 51.84 Mbps, considered the base rate bandwidth of a very high connection speed service. a. DSL b. OC c. Wi-Fi d. BPL
b. OC
Which of the following statements is true about radio frequency identification tags? a. They need enormous power. b. They are not always flat. c. They do not have a memory to store data. d. They should be several square inches in size.
b. They are not always flat.
fulfill organizational needs for reliable data communications while relieving the organization of the burden of providing its own network management and maintenance. a. Leased lines b. VANs c. Dial-up connections d. LANs
b. VANs
A can be thought of as a "tunnel" through the Internet or other public network that allows only authorized users to access company resources. a. peer-to-peer LAN b. VPN c. WLAN d. WAN
b. VPN
A is a device that connects two networks, such as a LAN, to the Internet. a. switch b. bridge c. router d. modem
b. bridge
Bluetooth is considered a technology, because it typically supports a network used by only one person. a. metropolitan area network b. personal area network c. wide area network d. local area network
b. personal area network
A can connect dissimilar networks and can be programmed to also act as a firewall to filter communications. a. switch b. router c. repeater d. modem
b. router
The major advantage of mobile phone is that . a. they use Internet-based phone services b. they are attached to people c. they create a virtual private network d. they are attached to offices
b. they are attached to people
is a popular medium for connecting computers and networking devices because it is relatively flexible, reliable, and low cost. a. Coaxial cable b. Twisted pair cable c. Twinaxial cable d. Optical fiber
b. twisted pair cable
A computer network within a building, or a campus of adjacent buildings, is called a . a. MAN (metropolitan area network) b. WAN (wide area network) c. LAN (local area network) d. PAN (personal area network)
c. LAN (local area network)
The most important and pervasive set of protocols for telecommunications and networks today is called . a. NFC b. WPA c. TCP/IP d. CDMA
c. TCP/IP
The proliferation of highspeed connection services, also called , is mainly the result of businesses' and individuals' rush to the Internet. a. baseband services b. static services c. broadband services d. bridge services
c. broadband services
is a standard communication protocol to create a radio connection between two devices. a. Long-term evolution b. Voice over Internet protocol c. Near-field communication d. Metropolitan area communication
c. near-field communication
The bandwidth of a communication medium is measured as . a. data per second b. rates per second c. codes per second d. bits per second
d. bits per second
A computer connected directly to the Internet backbone—the highest speed communication channels—is called a host. • True • False
True
A direct link to a wireless router or access point creates a hotspot. • True • False
True
A peer-to-peer LAN is one in which no central device controls communications. • True • False
True
A repeater amplifies or regenerates signals so that they do not become weak or distorted. • True • False
True
Each generation of mobile communication technologies refers to a communication protocol or a combination of protocols. • True • False
True
IEEE 802.16, Worldwide Interoperability for Microwave Access (WiMAX), increases the range and speed of wireless communication. • True • False
True
Radio frequency identification (RFID) technology enables us to conduct transactions and to make payments quickly. • True • False
True
The Wi-Fi Protected Access (WPA) and WPA2 security protocols offer encryption. • True • False
True
The important factors in choosing a networking medium are availability, current and potential bandwidth, and vulnerability to electromagnetic interference (EMI) or radio frequency interference (RFI). • True • False
True
The process of associating a character-based name such as course.com with an IP address is called domain name resolution, and the domain name resolution service is DNS (Domain Name System). • True • False
True
The use of e-mail, instant messaging, and voice mail has brought some secondary benefits to business communications by establishing a permanent written or electronic record of, and accountability for, ideas. • True • False
True
There are three basic types of networks: LANs, MANs, and WANs. • True • False
True
When a line is capable of carrying multiple transmissions simultaneously, it is said to be broadband. • True • False
True
A line is made of 24 channels (groups of wires) of 64 Kbps each. a. T1 b. T2 c. T3 d. T4
a. T1
are point-to-point dedicated digital circuits provided by telephone companies. a. T1 and T3 lines b. Nodes c. Optical carriers d. Microwaves
a. T1 and T3 lines
is a standard for software that digitizes and compresses voice signals and transmits the bits via the Internet link. a. VoIP b. SoIP c. IRC d. TCP/IP
a. VoIP
The first generation of mobile communication technologies used . a. circuit switching b. packet switching c. digital voice encoding d. GSM and CDMA protocols
a. circuit switching
With , data transmitted to computers from a telephone company's switching center remains digital throughout the entire transmission. a. digital subscriber line b. dial-up connections c. normal landline telephone service d. cable modems
a. digital subscriber line
The ability to scramble and code messages through keys that are shared only between the sender and receiver is referred to as _____. a. encryption b. decryption c. transcription d. transmission
a. encryption
are high-frequency radio waves that can carry signals over long distances with high accuracy. a. Microwaves b. Shortwaves c. Mediumwaves d. Kilometer waves
a. microwaves
The major downside of internet service provided by television cable firms is that cable . a. nodes are shared by all the subscribers connected to the cable b. cannot provide Internet access c. networks are not as secured as other networking services d. provides services only to one subscriber at a time
a. nodes are shared by all the subscribers connected to the cable
Businesses use to save on travel costs and lodging, car fleets, and the time of highly salaried employees incurred on bringing together employees working in different organizations or at different sites in the same organization. a. videoconferencing b. access points c. hotspots d. graphic communications
a. videoconferencing