MIS CHAPTER 7
The Ironman Triathlon World Championship now uses WiMAX technology, which includes cameras strategically placed along the course for spectators, fans, and family to watch the athlete's performance.
TRUE
Which of the following is a type of data connection able to transmit a digital signal at 1.544 Mpbs and is more expensive and reliable than cable or DSL? A. T1 line B. Dial-up line C. Modem line D. All of the above
A. T1 line
VPNs are often used to connect to a corporate server. VPN stands for a Valued Partner Network.
FALSE
Wireless networks offer many business advantages but can often slow employee productivity and workflow processes.
FALSE
Radio-frequency identification (RFID) uses electronic tags and labels to identify objects wirelessly over short distances.
TRUE
What enables telecommunications or the exchange of information (voice, text, data, audio, and video)? A. Computer networks B. Email C. HTML D. Technology sourcing
A. Computer networks
What does the wireless technology WiMAX stand for? A. Worldwide Interoperability for Microwave Access B. World Interconnected through Mobile Awareness C. World Interorganizations for Mobile Access D. Wide International for Misinformation Access
A. Worldwide Interoperability for Microwave Access
Which domain is the most common and reserved for commercial organizations and businesses? A. .net B. .com C. .biz D. .org
B. .com
Which of the below is an example of P2P? A. GoDaddy B. Skype C. Federal Communication Commission (FCC) D. Facebook
B. Skype
What are the four wireless communication network categories? A. Private servers, company servers, government servers, and international servers B. Protocol, land lines, rates, and worldwide C. Personal, local, regional, and international D. Personal area networks, wireless local area networks, wireless metropolitan area networks, and wireless wide area networks
D. Personal area networks, wireless local area networks, wireless metropolitan area networks, and wireless wide area networks
A wireless MAN (WMAN) is a metropolitan area network that uses ___________ to transmit and receive data. A. WI-FI ideas B. STP technology C. Cable connections D. Radio signals
D. Radio signals
A domain name system (DNS) converts IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions.
TRUE
Which domain is reserved for the U.S. military? A. .mil B. .gov C. .org D. .age
A. .mil
What is a combination of HTTP and SSL that provides encryption and secure identification of an Internet server? A. Secure hypertext transfer protocol (SHTTP) B. Secure sockets layer (SSL) C. SSL certificate D. SHTTP certificate
A. Secure hypertext transfer
Which benefits of a connected world makes all applications, equipment (such as a high-volume printer), and data available to anyone on the network, without regard to the physical location of the resource or the user? A. Sharing resources B. Providing opportunities C. Reducing travel D. All of the above
A. Sharing resources
How do TCP and IP differ? A. TCP verifies the correct delivery of data in case it is corrupted, where IP verifies the data are sent to the correct IP address B. TCP verifies the information is reliable, and IP verifies that the data is sent C. IP verifies the correct delivery of data in case it is corrupted, where TCP verifies the data are sent to the correct IP address D. IP verifies connectivity, and TCP verifies the rate at which the data is sent
A. TCP verifies the correct delivery of data in case it is corrupted, where IP verifies the data are sent to the correct IP address
Which domain is reserved for accredited postsecondary institutions? A. .mil B. .edu C. .biz D. .org
B. .edu
The bandwidths associated with Wi-Fi are separated according to several wireless networking standards, known as __________, for carrying out wireless local area network communication. A. Bits B. 802.11 C. 80118091 D. 91210
B. 802.11
What is a VPN? A. A direct network provider using a company server B. A direct private network that creates a "private tunnel" within the Internet to connect to the corporate server C. A direct URL that creates a private tunnel for a company D. A direct P2P that creates an open access community for a company
B. A direct private network that creates a "private tunnel" within the Internet to connect to the corporate server
What are the two main methods for encrypting network traffic on the Web? A. SSL and HTTP B. SSL and SHTTP C. DSL and HTTP D. HTML and SHTTP
B. SSL and SHTTP
What is a space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area? A. GPS B. Satellite C. GIS D. LBS
B. Satellite
Cell phones have morphed into _________ __________ that offer more advanced computing ability and connectivity than basic cell phones. A. Micro computers B. Smart phones C. Streaming phones D. Super computers
B. Smart phones
What is the standard Internet protocol, which provides the technical foundation for the public Internet? A. Data streaming and DSL protocols B. Transmission control protocol/Internet protocol (TCP/IP) C. Data streaming rules and regulations D. Internet protocol/Transmission control protocol (IP/TCP)
B. Transmission control protocol/Internet protocol (TCP/IP)
Which domain is reserved for U.S. government agencies? A. .info B. .USA C. .gov D. .US
C. .gov
What spans a large geographic area such as a state, province, or country, similar to the Internet? A. Metropolitan area network (MAN) B. Local area network (LAN) C. Wide area network (WAN) D. Secure area network (SAN)
C. Wide area network (WAN)
Which of the below statements is not accurate in reference to mobile and wireless computing? A. Mobile technology can travel with the user B. Wireless technology is any type of operation accomplished without the use of a hard-wired connection C. Wireless technology is any type of operation accomplished with the use of a hard-wired connection D. Mobile technology allows a user to download software to a laptop or cell phone for portable reading or reference
C. Wireless technology is any type of operation accomplished with the use of a hard-wired connection
Why would a company use an Intranet? A. Intranets are used for business operations and management B. Intranets are used for communications and collaboration C. Intranets are used for Web publishing D. All of the above
D. All of the above
. VoIP allows users to _____________. A. Call anyone with a local telephone number B. Call anyone with an international telephone number C. Call anyone with a cellular telephone number D. All of the above
D. All of the above
What are satellite communications used for? A. Cell phones B. Mobile base stations C. Satellite dish receivers D. All of the above
D. All of the above
What can unified communications merge? A. IMing B. Videoconferencing C. Voice Mail D. All of the above
D. All of the above
What is a benefit of network convergence? A. The weaving together of voice, data, and video B. Multiple services offered from a single vendor C. Multiple devices supported by one provider D. All of the above
D. All of the above
Which of the below allows a user to access the Internet? A. Dial-up connection B. Cable C. T1 line D. All of the above
D. All of the above
Which of the below is not a LAN? A. Home office B. Business office C. College dorm room D. The Internet
D. The Internet
Which of the below statements is inaccurate in reference to unified communications? A. UC decreases communication costs B. UC enhances the way individuals communicate C. UC enhances the way individuals collaborate D. UC increases communication expenses
D. UC increases communication expenses
What is VoIP? A. VoIP uses IP technology to transmit telephone calls B. VoIP offers the low cost ability to receive personal and business calls via computer C. VoIP offers the ability to have more than one phone number D. VoIP offers all of the above
D. VoIP offers all of the above
Which network uses radio signals to transmit and receive data over distances of a few hundred feet? A. WMAN B. WWAN C. PAN D. WLAN
D. WLAN
A global positioning system (GPS) consists of hardware, software, and data that provide location information for display on a multidimensional map.
FALSE
A local area network (LAN) spans a large geographic area such as a state, province, or country.
FALSE
A wireless LAN (WLAN) is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves.
FALSE
GPS utilizes location-based services (LBS), applications that use location information to provide a service, whereas a GIS does not use LBS applications.
FALSE
LBS differ from RFID in that an LBS cannot track and monitor objects such as inventory
FALSE
Mobile and wireless networks are identical and the terms can be used synonymously.
FALSE
Network convergence is the integration of communication channels into a single service.
FALSE
Secure sockets layer (SSL) is a combination of HTTP and SSL to provide encryption and secure identification of an Internet server.
FALSE
Wireless technology offers the opportunity to redesign and often complicates the work flow processes to be faster, yet more expensive, and more time-consuming
FALSE
A great GIS example, Google earth, combines satellite imagery, geographic data, and Google's search capabilities to create a virtual globe that users can download to a computer or mobile device.
TRUE
An intranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, Web publishing, and the support of business processes.
TRUE
Enhancing mobility is one of the greatest advantages provided by wireless networks. It allows activities that were formerly tied to physical locations to be performed almost anywhere.
TRUE
Instant access to customer profiles, account history, and current order status significantly improves the quality of interactions with customers, suppliers, and business partners.
TRUE
One of the main challenges of business mobility is protecting against theft.
TRUE
RFID innovations and technologies are being used in many industries including retail, hospitals, pharmaceuticals, and ranchers.
TRUE
Some of the social challenges with networking occur with newsgroups or blogs where like-minded people can exchange messages. Problems can arise when sensitive social issues become the topic of discussion such as politics or religion.
TRUE
The main challenges facing networks include security, social, ethical and political issues
TRUE
Which social media site uses LBS? A. Foursquare B. iTunes C. Google D. YouTube
A. Foursquare
What is the digital divide? A. A worldwide gap giving advantage to those with access to technology B. A data interruption in the Internet connection C. A deficiency in school-aged children with computer knowledge D. A divide between the economies of third world countries
A. A worldwide gap giving advantage to those with access to technology
What measures network performance by the maximum amount of data that can pass from one point to another in a unit of time? A. Bandwidth B. Frequency C. Access D. Protocol
A. Bandwidth
Which of the following terms refers to the smallest element of data and has a value of either 0 or 1? A. Bit B. Bandwidth C. Modem D. Internet protocol
A. Bit
The potential for contracting viruses on mobile devices is increasing; in fact, the first known mobile phone virus was called _____________. A. Cabir B. Cadet C. Capital D. Caviar
A. Cabir
Which of the following allows high-speed digital data transmission over standard telephone lines? A. Digital subscriber line (DSL) B. Data subscription service (DSS) C. Dominance service line (DSL) D. Data converter input (DCI)
A. Digital subscriber line (DSL)
What are areas around access points where users can connect to the Internet via WI-FI? A. Hotspots B. Café or coffee shop C. Company break rooms D. Warmspots
A. Hotspots
What is the largest and most important network that has evolved into a global information superhighway? A. Internet B. Intranet C. Extranet D. LAN
A. Internet
What is a benefit of VoIP? A. Lowers costs B. Clear connection C. Higher expenses D. All of the above
A. Lowers costs
What is a large computer network usually spanning a city or a specific infrastructure like a college known as? A. Metropolitan area network (MAN) B. Local area network (LAN) C. Wide area network (WAN) D. Secure area network (SAN)
A. Metropolitan area network (MAN)
What is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server? A. Peer-to-peer (P2P) B. Voice over IP (VoIP) C. Internet protocol TV (IPTV) D. All of the above
A. Peer-to-peer (P2P)
Which business application uses electronic tags and labels to identify objects wirelessly over short distances? A. Radio-frequency identification B. Global positioning systems C. Geographic information systems D. Location-based services
A. Radio-frequency identification
What is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred? A. Streaming B. Streamlining C. Networking D. Wireless
A. Streaming
What is the worldwide gap giving advantage to those with access to technology? A. Digital subscriber B. Digital divide C. Digital Darwinism D. Digital era
B. Digital divide
What are the two most prevalent types of broadband access? A. Data subscriber and cable connection B. Digital subscriber line and cable connection C. Digital line and client line D. Digital server and client server
B. Digital subscriber line and cable connection
Which statement below is inaccurate in reference to domain names? A. Domain names are rented B. Domain names are owned C. Domain names are renewable D. GoDaddy is a popular domain name registrar
B. Domain names are owned
Which business application is a satellite-based navigation system providing extremely accurate position, time, and speed information? A. Radio-frequency identification B. Global positioning systems C. Geographic information systems D. Location-based services
B. Global positioning systems
Which of the following provides Internet access using a cable television company's infrastructure and a special cable modem? A. ISP cable box B. Internet cable connection C. Satellite cable box D. Satellite cable connection
B. Internet cable connection
What distributes digital video content using IP across the Internet and private IP networks? A. Internet broadband policy network B. Internet protocol TV (IPTV) C. Internet Television Interactivity (ITVI) D. Internet television personalization
B. Internet protocol TV (IPTV)
Which of the following includes the three primary network types? A. LAN, WAN, SAN B. LAN, WAN, MAN C. LAN, SAN, XAN D. LAN, WAN, XAN
B. LAN, WAN, MAN
What connects a group of computers in close proximity, such as in a school or office setting? A. Metropolitan area network (MAN) B. Local area network (LAN) C. Wide area network (WAN) D. Secure area network (SAN)
B. Local area network (LAN)
What is a device that enables a computer to transmit and receive data? A. Broadband B. Modem C. Bandwidth D. ISP
B. Modem
The Internet is a hierarchical structure linking different levels of service providers whose millions of devices supply all the interconnections. The three levels outlined in the book from the top down include ____________________. A. New system provider (NSP), Current system provider (CSP), and Order entry system provider (OSP) B. National service provider (NSP), Regional service provider (RSP), and Internet service provider (ISP) C. Net server point (NSP), Radio server point (RSP), and Internet server point (ISP) D. None of the above
B. National service provider (NSP), Regional service provider (RSP), and Internet service provider (ISP)
What is the integration of communication channels into a single service? A. Instant communication B. Unified communication C. Peer-to-peer communication D. Voice over communication
B. Unified communication
________ is a security protocol that protects Wi-Fi networks. A. Wireless prevention policy B. Wi-Fi protected access C. Wireless security regulations D. Wi-Fi technology port
B. Wi-Fi protected access
What is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves? A. Bluetooth B. Wireless fidelity (WI-FI) C. Wide area network (WAN) D. Wireless data centers
B. Wireless fidelity (WI-FI)
The speed of transmission of a network is determined by the speed of its smallest _____________. A. Unit of time B. Number of computers C. Amount of bandwidth D. Number of customers
C. Amount of bandwidth
What is a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices? A. Laptop B. PDA C. Bluetooth D. Camera
C. Bluetooth
What is a high-speed Internet connection that is always connected and has a bandwidth greater than 2 Mbps? A. Analog B. Dial up C. Broadband D. None of the above
C. Broadband
What are the five elements that are needed to create a connected world or a network? A. Categories, programs, alternatives, people, and core philosophy B. Program, providers, access, mechanics, and teachers C. Categories, providers, access technologies, protocols, and convergence D. LAN, WAN, MAN, PAN, and SAN
C. Categories, providers, access technologies, protocols, and convergence
A wireless WAN (WWAN) is a wide area network that uses radio signals to transmit and receive data and can be divided into which two categories? A. Cellular communications and multiple user communication systems B. Mobile and wireless technologies C. Cellular and satellite communication systems D. Client and server systems
C. Cellular and satellite communication systems
Which business application consists of hardware, software, and data that provide location information for display on a multidimensional map? A. Radio-frequency identification B. Global positioning systems C. Geographic information systems D. Location-based services
C. Geographic information systems
What is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, and web publishing? A. National ISP B. Regional ISP C. Intranet D. Extranet
C. Intranet
NSPs are private companies that own and maintain the worldwide backbone that supports the Internet. Which of the below is not an NSP? A. Sprint B. Verizon C. Microsoft D. AT&T
C. Microsoft
What is the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures? A. Network protocol B. Networking category C. Network convergence D. Network communication
C. Network convergence
What is the standard that specifies the format of data as well as the rules to be followed during transmission? A. Bandwidth B. Bit rate C. Protocol D. Transmission record
C. Protocol
To create an SSL connection, a Web server requires a _____________, which is an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company. A. DSL Degree B. SSL Degree C. SSL Certificate D. DSL Certificate
C. SSL Certificate
What is the major challenge of networking or performing business in a connected world? A. Personal issues B. Society demands C. Security issues D. Telecommuting demands
C. Security issues
What is a feature of IPTV? A. IPTV uses low bandwidth B. IPTV offers personalization C. IPTV supports multiple devices D. All of the above
D. All of the above
What services do telecommunications offer? A. Telephone and cellular services B. Cable and satellite services C. Internet services D. All of the above
D. All of the above
Which of the below is experiencing rapid growth due to wireless technology? A. RFID B. GPS C. GIS D. All of the above
D. All of the above
Which of the below offers a common example of a LAN? A. College campus B. Home office C. City library D. All of the above
D. All of the above
Which of the below offers an example of a WAN? A. The Internet B. Microsoft's main campus in Washington C. The city of Denver's court and police departments D. All of the above
D. All of the above
Which of the below uses both GIS and GPS? A. Navigation B. Wireless advertising C. Vehicle location D. All of the above
D. All of the above
Which of the following is a measure being considered to address privacy concerns with RFIDs and LBSs? A. Clearly labeled RFID tags on products B. Kill codes C. RSA Blocker Tags D. All of the above
D. All of the above
Which of the below is not a major ISP in the United States? A. Earthlink B. NetZero C. Comcast D. Apple
D. Apple
What measures bandwidth in terms of numbers transferred or received per unit of time? A. Connection time B. Broadband C. Protocol D. Bit rate
D. Bit rate
An extranet is not available for use by a ______________. A. Customer B. Supplier C. Employee D. Competitor
D. Competitor
LANs, WANs, and MANs all provide users with an accessible and reliable network infrastructure. Which of the below are the most important network differentiating dimensions? A. Reliability and timing B. Confidentiality and performance C. Security and cost D. Cost and performance
D. Cost and performance
What is the conversion of IP addresses that identifies labels that use a variety of recognizable naming conventions? A. Domain grades B. URL spaces C. Domain national sequences (DNS) D. Domain name system (DNS)
D. Domain name system (DNS)
Which of the following is not a primary use of GIS? A. Finding what is nearby from a specific location B. Mapping densities C. Routing information D. Ensuring safety equipment is on an airplane before a flight.
D. Ensuring safety equipment is on an airplane before a flight.
What is an extension of an Intranet that is available only to authorized outsiders? A. National ISP B. Regional ISP C. Intranet D. Extranet
D. Extranet
What is a disadvantage of networking or performing business in a connected world? A. Reduces travel and expenses B. Provides opportunities C. Shares resources D. Increases resource threats
D. Increases resource threats
Which business application uses location information to provide a service and is designed to give mobile users instant access to personalized local content? A. Radio-frequency identification B. Global positioning systems C. Geographic information systems D. Location-based services
D. Location-based services
Which of the following is not a type of wireless network? A. PAN B. WLAN C. WWAN D. MAN
D. MAN
The three main benefits of networks or a connected world include sharing resources, providing opportunities, and reducing travel.
TRUE
Two methods for encrypting network traffic on the Web are secure sockets layer and secure hypertext transfer protocol.
TRUE
WLANs that use Wi-Fi have a built-in security mechanism called Wi-Fi protected access (WPA), a wireless security protocol to protect Wi-Fi networks.
TRUE
Wireless networking includes personal area networks (PAN) that provide communication over a short distance that is intended for use with devices that are owned and operated by a single user.
TRUE
With the power of a wireless network, business professionals can take advantage of mobility allowing them to work from anywhere, at any time, using many different devices.
TRUE
Worldwide Interoperability for Microwave Access (WiMAX) is a communications technology aimed at providing high-speed wireless data over metropolitan area networks.
TRUE