Chapter 7 - Managing the Info Function

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

29) A network that spans a college or corporate facility is called a: A) CAN. B) MAN. C) LAN. D) WAN. E) WSN.

A) CAN

9) On which of the following protocols is the Internet based? A) TCP/IP B) FTP C) IMAP D) HTTP E) DNS

A) TCP/IP

52) Web browser software requests web pages from the Internet using which of the following protocols? A) URL B) HTTP C) DNS D) HTML E) FTP

B) HTTP

46) Which organization manages the domain name system of the Internet? A) none (no one "owns" the Internet) B) W3C C) ICANN D) The Department of Commerce (U.S.) E) IAB

C) ICANN

1) Which of the following is a device that sends packets of data through different networks assuring they go to the correct address? A) Hub B) Switch C) Router D) NIC E) Modem

C) Router

61) Which of the following is not a defining feature of Web 2.0? A) Interactivity B) Real-time user control C) Semantic search D) Social participation (sharing) E) User-generated content

C) Semantic search

90) The 802.11 set of standards is known as: A) WLAN. B) WSN. C) Wi-Fi. D) WiMax. E) WAN.

C) Wi-Fi

43) What service converts IP addresses into more recognizable alphanumeric names? A) HTML B) FTP C) IP D) HTTP E) DNS

E) DNS

50) ________ integrate disparate channels for voice communications, data communications, instant messaging, email, and electronic conferencing into a single experience. A) Wireless networks B) Intranets C) Virtual private networks D) Modems E) Unified communications

E) Unified communications

11) Computer networks are based on the same principles as telephone networks.

FALSE

15) A computer network consists of at least two computers.

TRUE

65) By 2018, it is estimated that more than 200 million Americans will use mobile search.

TRUE

58) Which process is used to protect transmitted data in a VPN? A) Tunneling B) PPP C) VOIP D) Packet-switching E) Chaining

A) Tunneling

32) The total amount of digital information that can be transmitted through any telecommunications medium is measured in: A) bps. B) Hertz. C) baud. D) gigaflops. E) RPMs.

A) bps

93) Macy's Pick to the Last Unit system, described in the chapter-opening case, is an example of which of the following? A) Web 3.0 application B) IoT application C) BLE application D) GPS application E) RFID application

B) IoT application

92) Based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business? A) Logging transactions B) Managing the supply chain C) Lowering network costs D) Enabling client communication E) Improving employee engagement

B) Managing the supply chain

25) Which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network? A) Local area network B) Modem C) DSL D) Twisted wire E) TCP/IP

B) Modem

24) Which signal types are represented by a binary waveform? A) Laser B) Optical C) Digital D) RFID E) Analog

C) Digital

35) Fiber-optic cable is more expensive and harder to install than wireless media

TRUE

6) In TCP/IP, IP is responsible for which of the following? A) Disassembling and reassembling packets during transmission B) Establishing an Internet connection between two computers C) Moving packets over the network D) Sequencing the transfer of packets E) Breaking messages down into packets

A) Disassembling and reassembling packets during transmission

40) Which of the following is not one of the top five search engines? A) Facebook B) Yahoo C) Microsoft Bing D) Baidu E) Google

A) Facebook

82) Which digital cellular standard is used widely throughout the world except the United States? A) GSM B) CDMA C) WLAN D) LTD E) 4G

A) GSM

81) All of the following are physical components of an RFID system except: A) bar codes. B) antennas. C) radio transmitters. D) tags. E) a stationary or handheld device.

A) bar codes

49) Instant messaging is a type of ________ service. A) chat B) cellular C) email D) wireless E) network

A) chat

51) A VPN: A) is an encrypted private network configured within a public network. B) is more expensive than a dedicated network. C) provides secure, encrypted communications using Telnet. D) is an Internet-based service for delivering voice communications. E) is a proprietary networking service technology developed by individual corporations

A) is an encrypted private network configured within a public network

41) Digital subscriber lines: A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial cable lines to deliver Internet access. C) are very-high-speed data lines typically leased from long-distance telephone companies. D) have up to twenty-four 64-Kbps channels. E) are assigned to every computer on the Internet.

A) operate over existing telephone lines to carry voice, data, and video

85) Wireless sensor networks (WSNs) are used for the following tasks except: A) processing consumer transactions. B) monitoring machines. C) detecting radioactive materials. D) protecting property. E) identifying vehicles for trucking firms.

A) processing consumer transactions

83) The concept of a future web in which it is commonplace for everyday objects to be connected, controlled, or monitored over the Internet is called: A) the Internet of Things. B) the Semantic Web. C) Internet2. D) a 3-D Web. E) Web 2.0.

A) the Internet of Things

53) Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): A) uniform resource locator. B) IP address. C) third-level domain. D) root domain. E) child domain.

A) uniform resource locator

64) A(n) ________ is software for locating and managing stored web pages. A) web server B) net server C) router D) modem E) hub

A) web server

7) Which of the following is the best description of a protocol in a telecommunications network architecture? A) A device that handles the switching of voice and data in a local area network B) A standard set of rules and procedures for control of communications in a network C) A communications service for microcomputer users D) The main computer in a telecommunications network E) A pathway through which packets are routed

B) A standard set of rules and procedures for control of communications in a network

55) Which of the following pulls content from websites and feeds it automatically to a user's computers? A) FTP B) RSS C) HTTP D) Bluetooth E) IPv6

B) RSS

45) In the domain name "http://books.azimuth-interactive.com", which element is the second-level domain? A) books B) azimuth-interactive.com C) com D) none; there is no second-level domain in this name E) books.azimuth-interactive

B) azimuth-interactive.com

47) IPv6 has been developed in order to: A) update the packet transmission protocols for higher bandwidth. B) create more IP addresses. C) allow for different levels of service. D) support Internet2. E) reduce excess IP addresses

B) create more IP addresses.

44) The domain .gov is a(n): A) Internet root domain. B) top-level domain. C) host domain. D) network domain. E) third level domain.

B) top-level domain

91) The WiMax standard can transmit up to a distance of approximately: A) 30 meters. B) 500 meters. C) 30 miles. D) 5 miles. E) 70 miles.

C) 30 miles

8) What are the four layers of the TCP/IP reference model? A) Physical, Application, Transport, and Network Interface B) Physical, Application, Internet, and Network Interface C) Application, Transport, Internet, and Network Interface D) Application, Hardware, Internet, and Network Interface E) Software, Hardware, Network Interface, Internet

C) Application, Transport, Internet, and Network Interface

) The Internet is based on which three key technologies? A) TCP/IP, HTML, and HTTP B) TCP/IP, HTTP, and packet switching C) Client/server computing, packet switching, and the development of communications standards for linking networks and computers D) Client/server computing, packet switching, and HTTP E) Email, instant messaging, and newsgroups

C) Client/server computing, packet switching, and the development of communications standards for linking networks and computers

5) Which of the following is not a characteristic of packet switching? A) Packets travel independently of each other. B) Packets are routed through many different paths. C) Packet switching requires point-to-point circuits. D) Packets include data for checking transmission errors. E) Packets are reassembled into the original message when they reach their destinations.

C) Packet switching requires point-to-point circuits.

28) Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents? A) MAN B) Domain-based LAN C) Peer-to-peer network D) WAN E) SAN

C) Peer-to-peer network

94) A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub. A) RFID receiver B) WiMax receiver C) access point D) hub E) hotspot

C) access point

31) Bandwidth is the: A) number of frequencies that can be broadcast through a medium. B) number of cycles per second that can be sent through a medium. C) difference between the highest and lowest frequencies that can be accommodated on a single channel. D) total number of bytes that can be sent through a medium per second. E) geographical distance spanned by a network.

C) difference between the highest and lowest frequencies that can be accommodated on a single channel

88) Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication. A) two B) five C) eight D) fifteen E) twenty

C) eight

60) Shopping bots use ________ software for searching the Internet. A) Web 2.0 B) Web 3.0 C) intelligent agent D) comparison E) SEO

C) intelligent agent

87) The most appropriate wireless networking standard for creating PANs is: A) I-mode. B) IEEE 802.11b. C) Wi-Fi. D) Bluetooth. E) RFID.

D) Bluetooth

62) A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers. A) RSS B) WAN C) NFP D) ISP E) FTP

D) ISP

26) Which type of network is used to connect digital devices within a city or metropolitan area? A) Wi-Fi B) LAN C) WAN D) MAN E) SAN

D) MAN

84) Which of the following statements about RFID is not true? A) RFIDs transmit only over a short range. B) RFIDs use an antenna to transmit data. C) Microchips embedded in RFIDs are used to store data. D) RFIDs require line-of-sight contact to be read. E) RFID tags and antennas come in a variety of shapes and sizes

D) RFIDs require line-of-sight contact to be read

56) Which of the following can be used to help a website achieve a higher ranking with the major search engines? A) VPN B) IAB C) SEM D) SEO E) RSS

D) SEO

4) The telephone system is an example of a ________ network. A) peer-to-peer B) wireless C) packet-switched D) circuit-switched E) client/server

D) circuit-switched

10) Client/server computing is a: A) network that connects sensors to desktop computers. B) network where centralized mainframe computers serve local devices. C) centralized model of computing for large corporations. D) distributed computing model where clients are linked to one another through a network that is controlled by a network server computer. E) centralized computing model where local computers are connected to one another by a network.

D) distributed computing model where clients are linked to one another through a network that is controlled by a network server computer.

30) A network that covers entire geographical regions is most commonly referred to as a(n): A) local area network. B) intranet. C) peer-to-peer network. D) wide area network. E) metropolitan area network.

D) wide area network.

54) The most common web servers today are: A) Microsoft IIS and IBM HTTP Server. B) WebSTAR and Netscape Server. C) IBM HTTP Server and Apache HTTP Server. D) Netscape Server and Apache HTTP. E) Apache HTTP Server and Microsoft IIS

E) Apache HTTP Server and Microsoft IIS

86) 4G networks use which of the following standards? A) GSM and LTD B) CDMA and PAN C) LTE and LTD D) T-Mobile and AT&T E) LTE and WiMax

E) LTE and WiMax

3) Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations? A) Multiplexing B) Packet shifting C) Packet routing D) ATM E) Packet switching

E) Packet switching

27) Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server? A) MAN B) Wireless C) LAN D) Windows domain network E) Peer-to-peer

E) Peer-to-peer

59) ________ monetizes the value of the data stored by search engines. A) TCP/IP B) RSS C) WiMax D) IoT E) Search Engine Marketing

E) Search Engine Marketing

42) T1 lines: A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) do not provide guaranteed service levels, but simply "best effort." D) have up to twenty-four 64-Kbps channels. E) are high-speed, leased data lines providing guaranteed service levels.

E) are high-speed, leased data lines providing guaranteed service levels

33) A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits. A) modulated B) broadband C) T1 D) analog E) digital

E) digital

89) One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as: A) touch points. B) netcenters. C) hot points. D) wireless hubs. E) hotspots.

E) hotspots

63) The backbone networks of the Internet are typically owned by long-distance telephone companies called: A) regional network providers. B) enhanced service providers. C) internet bulk providers. D) backbone providers. E) network service providers.

E) network service providers

48) Predictive search in Google's search engine: A) maintains a history of your searches and then predicts what you will search on next. B) uses a tracking service and cookies on your browser to predict search results. C) uses a knowledge graph of what similar people searched on to predict your search interests. D) uses a semantic approach to predict what you are looking for. E) predicts what you are looking for as you enter words into the query box

E) predicts what you are looking for as you enter words into the query box

12) A NOS must reside on all the local computers in a network.

FALSE

95) RFID technology is being gradually replaced by less costly technologies such as WSNs.

FALSE

97) NFC tags are always passive

FALSE

73) In addition to being an online retailer, Amazon is also a powerful product search engine

TRUE

74) The Internet of Things is based on billions of Internet-connected sensors throughout the physical world.

TRUE

96) Apple Pay uses an RFID-related technology called near field communication

TRUE

13) A hub is a networking device that sends packets of data to all other devices on the network.

TRUE

14) In a client/server network, a network server sets the rules of communication for the network.

TRUE

16) Client/server computing has largely replaced centralized mainframe computing.

TRUE

17) Computer networks that use packet switching are much more efficient than telephone networks that use circuit switching.

TRUE

18) Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.

TRUE

19) In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.

TRUE

20) TCP/IP was developed during the early 1970s to support efforts to help scientists transmit data among different types of computers over long distances.

TRUE

34) Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire

TRUE

36) Bandwidth refers to the range of frequencies that can be transmitted by a telecommunications channel

TRUE

66) Wikis allow visitors to change or add to the original posted material.

TRUE

67) The Domain Name System (DNS) converts domain names to IP addresses.

TRUE

68) VoIP technology delivers voice information in digital form using packet switching.

TRUE

69) Web 3.0 is an effort to add a layer of meaning to the existing web in order to reduce the amount of human involvement in searching for and processing web information.

TRUE

70) Mobile search makes up more than 50% of all Internet searches.

TRUE

71) The "Internet of Things" refers to a vision of a pervasive Web, in which common objects are connected to and controlled over the Internet.

TRUE

72) Digital rights activists believe differentiated pricing violates net neutrality principles.

TRUE


Ensembles d'études connexes

Management Exam 2 Study Plan Questions

View Set

IIC Chapter 7 Verbal Communication and Culture

View Set

Algebra 1 Unit 1 - Language of Algebra

View Set

Vocabulary & Writing/Naming Ionic Formulas

View Set

Mike Meyers' CompTIA A+ Chapter 13 Users, Groups, and Permissions

View Set

Older Adult Hesi: Neurocognitive Disorder: Alzheimer's Disease (Early Onset)

View Set

507 CITI Belmont Report and Its Principles, History and Ethical Principles - SBE, Defining Research with Human Subjects - SBE, The Federal Regulations - SBE, Assessing Risk - SBE, & Informed Consent - SBE, Privacy and Confidentiality - SBE

View Set

Personal Finance Test Review Ch. 15-17

View Set

Pharmaceutics Exam II Case Study Questions

View Set