Unit 5: Quiz
-1- are typically used in logistics and inventory management applications while -2- are typically used to monitor physical or environmental conditions. A) RFID B) WSNs C) Barcodes
1. A) RFID *RFID technology is widely used in supply chain management. 2. B) WSNs *WSNs are wireless sensor networks that are used to monitor conditions.
-1- of a wireless network can lead to -2-, in which a hacker tricks the network into providing sufficient information to access the network. A) Sniffing B) Spoofing
1. A) Sniffing *Sniffing of wireless networks can lead to network probing where the network is tricked into providing hackers with sufficient information to access the network. 2. B) Spoofing *Spoofing is the process of tricking the network into providing hackers with sufficient information to access the network. Spoofing occurs after sniffing.
Wireless LAN networks are simple to install because there is no -1- installation through walls or ceilings. Wireless LAN networks support the mobility of the on-site workforce, which increases -2- and access to real-time information. A) cable B) router C) antenna D) productivity E) collaboration F) mobility
1. A) cable *Wireless LAN do not need cables. 2. D) productivity *When staff have mobility, they can access information anytime, increasing productivity.
As an e-commerce company, your business is "susceptible," so efforts are made to prevent a denial-of-service attack. A denial-of-service attack is a means to -1- or suspend services of an Internet host. Denial-of-service attacks are common threats to -2- websites. A) interrupt B) turn off C) hack D) business E) client F) host
1. A) interrupt *Denial-of-service attacks disrupt, interrupt, or suspend services from an Internet host computer. 2. D) business *Business websites are the most common targets of denial-of-service attacks.
Wireless communication is transmitted over -1- through the -2-. A) radio waves B) short waves C) optical waves D) atmosphere E) landline F) antenna
1. A) radio waves *Wireless communication is transmitted over radio waves. 2. D) atmosphere *Radio transmissions travel through the air or atmosphere.
Wired networks provide the enterprise network reliability and -1-. At the same time, the downside of wired networks is the large amount of -2- in the building that is awkward to map, manage, and maintain. A) security B) bandwidth C) speed D) cables E) conduits F) protocols
1. A) security *Wired networks are inherently more secure because signals cannot be sniffed without physical penetration of premise. 2. D) cables *Wired networks are difficult to maintain because they require cables throughout the building. They are difficult to scale and manage changes and moves.
Organizations can use the Internet as a communication tool. For instance, organizations can communicate -1- in real time, with their clients using online chat or instant messaging applications. On the other hand, organizations can communicate -2- with their clients via bulletin boards, blogs, and streaming videos. A) asynchronously B) synchronously
1. B) synchronously *Synchronously refers to happening at the same time. Online chat and instant messaging allow users to communicate with each other at the same time. 2. A) asynchronously *Asynchronously refers to events happening at different times. Bulletin boards, blogs, and streaming videos allow users to use applications whenever they want to.
You are managing a small business network. They have a web or database server so you will need to design their network as a -1- topology, while a large enterprise would best benefit from a -2- network to manage network moves and changes. A) star B) peer-to-peer C) client-server D) physical E) WWW F) LAN G) virtual
1. C) client-server *Small businesses with computer server needs should design their networks as client-server. 2. G) virtual *Large enterprises can manage moves and changes more productively with virtual network capability.
Users can communicate on the Internet via -1-, such as instant messaging, audio and video communications, or unified communications; or they can use -2- as repositories of information; or they can use -3- to access remote computers. A) file storage and hosting B) portals and connections C) electronic communication
1. C) electronic communication *Electronic communication consists of emails, instant messaging, audio clips, video communications, and unified communications. 2. A) file storage and hosting *File storage and hosting refers to repositories of information, storage for retrieval, or archival of documents. 3. B) portals and connections *Portals and connections consist of applications, protocols, and other technology that allow protected and unprotected connections from one computer to another.
The TCP protocol consists of -1- layers. -2- is not a protocol layer but an OSI layer. A) seven B) two C) four D) Link E) Internet F) Physical
1. C) four The Transmission Control Protocol, or TCP protocol, consists of four abstraction layers. 2. F) Physical *The physical layer is not part of the TCP model, but of the OSI model.
While small businesses and home offices typically use -1- topology, RMD will be switching to -2- topology. A) client-server B) WAN C) peer-to-peer D) star configuration E) client-server
1. C) peer-to-peer *Most small businesses and home offices use peer-to-peer topology. 2. E) client-server *RMD is considering adding a server, which will require them to switch to client-server technology.
Small office or home office routers enable computers to access the -1-. Connection to the web is enabled by service providers called -2-. A) LAN B) Wi-Fi C) WAN D) Internet E) Telco F) cell network G) ISP
1. D) Internet *Small and large offices use routers to connect to the Internet, or world wide web. 2. G) ISP *ISPs, or Internet Service Providers, offer services to the business to gain access to the Internet.
Several communication forms are used in an organization. For instance, companies can use the -1- to manage their internal phone system, or employees can use the -2- to gain remote access to the corporate network server. If budget is a concern, managers could request that employees use -3- for meetings. Employees can also use the -4- function on their company-issued smartphones when traveling to client's site. A) VPN B) GPS C) VoIP D) PBX
1. D) PBX *The PBX is a phone system used internally by many businesses. 2. A) VPN *A virtual private network (VPN) is a secure tunnel through the Internet using a public network infrastructure. 3. C) VoIP *Voice over Internet Protocol (VoIP) is a technology that uses high-speed Internet and audio communications. 4. B) GPS *GPS is a unique sensor on the smartphone that provides users with geographical information and navigation.
If you want to visit the Barnes & Noble website, you will type the -1- of barnesandnoble.com in the -2- of your web browser. The DNS will convert barnesandnoble.com into -3-, and you will use the -4- protocol to communicate with the world wide web. A) URL B) IP address C) HTTP D) domain name
1. D) domain name *Domain name is the name assigned to a website. When a surfer types the website's domain name into the URL, it will be converted to an IP address by the Domain Name Service. 2. A) URL *URL stands for Uniform Resource Locator. It is a protocol used by a client computer to request a website from a server via HTTP or HTTPS. 3. B) IP address *Every computer or hardware device that is connected to the Internet must have an IP address. The DNS will convert the domain name into an IP address that the network computer can understand. 4. C) HTTP *HTTP stands for Hypertext Transfer Protocol, and is the communications protocol at the foundation of all communication of the world wide web.
The revolutionary Internet innovation has provided corporations with many applications to conduct business. For instance, an organization can utilize -1- to transfer documents automatically without human intervention to their suppliers. They can communicate with their stakeholders via -2-. Their suppliers can access product and inventory information from the -3- and their customers can shop 24/7 via the -4-. A) electronic communications B) Web-enabled storefront C) information repositories D) electronic data interchange
1. D) electronic data interchange *Electronic Data Interchange (EDI) is the electronic exchange of data and documents from one computer system to another through a standardized messaging format that does not require human intervention. 2. A) electronic communications *Electronic communications provides an excellent way for businesses to communicate with their stakeholders. 3. C) information repositories *Information repositories, also known as knowledge centers, provide helpful information to remote suppliers, partners, employees, and customers, either for free or as a revenue-generating service. It does not transfer documents for businesses. 4. B) Web-enabled storefront *The Internet allows the creation of a web-enabled storefront, whereby online retailers can advertise and sell their products online to anyone, located anywhere, and around the clock, 24/7.
-1- is a legacy wireless encryption protocol. WPA is a newer more secure encryption protocol for wireless networks and stands for -2-. A) WEP B) WAN C) ATM D) Wi-Fi Protected Access E) Wi-Fi Personal Access F) Wi-Fi Protected Assurance
2. A) WEP *WEP is a legacy and vulnerable Wi-Fi encryption protocol. 3. D) Wi-Fi Protected Access *WPA stands for Wi-Fi Protected Access and replaced WEP as the encryption protocol.
Which of the following best describes a computer network? A) A computer network is a data communications system that uses cable or wireless media to transmit and receive signals. B) A computer network is a bus link that transfers data between computer components. C) A computer network is a small group of computers connected and sharing data files.
A) A computer network is a data communications system that uses cable or wireless media to transmit and receive signals. *A computer network is a collection of interlinked computers that can exchange information over links in the form of digital packets.
The Internet's effect on the implementation of information systems has been large. What is the impact of the Internet on the implementation of information systems? (Select all that apply.) A) Business intelligence and data mining tools are enabling the Internet to become a critical component in today's information systems. B) The explosion of the Internet has resulted in a less complex model of doing business electronically and in the cloud. C) Handhelds and wearables have been adopted at amazing speeds by users and organizations to improve productivity and efficiency of their information systems.
A) Business intelligence and data mining tools are enabling the Internet to become a critical component in today's information systems. C) Handhelds and wearables have been adopted at amazing speeds by users and organizations to improve productivity and efficiency of their information systems. *Handheld and wearable devices, such as smartphones and iWatch, are becoming a norm in today's society, both for personal and business uses. These devices help businesses maximize communication with their stakeholders and improve customer intimacy. More and more applications such as business intelligence and data mining tools are implemented over the Internet, and they have a tremendous impact on how organizations implement their information systems to conduct business.
The second generation, or 2G, launch used which digital standard for data and voice communication? A) CDMA B) DMA C) GSM
A) CDMA *CDMA (code division multiple access) was developed during the second generation cellular networks.
A Walmart customer visits the Walmart.com site as a client, puts in a request to the Walmart server system, and the system processes and fulfills the client's request. This is known as what type of system? A) Client-server B) Peer-to-peer networking C) Cloud computing
A) Client-server *Computer transactions where the server fills a request made by a client are common in business and the client-server model has become a central part of network computing.
Which one of the following would be the least likely threat to the business if PPP installed a new wireless network? A) Denial-of-service attack B) Sniffing C) Spoofing
A) Denial-of-service attack *A denial-of-service attack is a means to disrupt, interrupt, or suspend services of an Internet host computer, not a wireless network.
The biggest impact to business and information management systems will be from mobile devices pushing the need for mobile applications. Mobile devices will have which of the following impacts except what? A) Enhanced Ethernet capabilities B) Increased need for remote access C) Mobile device web development D) Increased wireless network demand
A) Enhanced Ethernet capabilities *Mobile device growth will not warrant enhanced Ethernet capabilities.
Assume you are building out wired technologies in an old building. If you are replacing token rings, what technology are you most likely to be replacing it with? A) Ethernet B) Fiber C) Wireless
A) Ethernet *Ethernet replaced token rings as a data communications standard in LAN applications.
If a manufacturing plant uses their systems to communicate with suppliers and vendors to manage their inventories, what application is used? A) Extranet B) Intranet C) Internet
A) Extranet *Internet, intranet, and extranet are excellent means of communications for businesses, customers, and suppliers, but typically the extranet is used to communicate with suppliers and vendors to manage their inventories.
In a client-server network linking several individual computers or a LAN network together, each of the client computers connected to the network server is provided with which of the following so that it can be found by others on the network? A) IP address B) domain name C) IPv6 D) protocol
A) IP address *IP stands for Internet Protocol. An IP address is a unique address assigned to a computer or device connected to the Internet.
Walmart utilizes SCM to order its inventories. A) Interact with suppliers B) Gain intelligence C) Interact with customers D) Sell digital goods
A) Interact with suppliers *Supply chain management (SCM) allows retailers to order their inventories directly from the manufacturers.
To facilitate efficient and effective business, corporations utilize the -Select- to communicate with their customers. A) Internet B) intranet C) extranet
A) Internet
Which of the following statements are true regarding Voice over Internet Protocol (VoIP)? (Select all that apply.) A) It is based on a high-speed Internet connection to deliver voice communications. B) It uses the standard public switched telephone network (PSTN) connection. C) It results in lower phone charges for businesses because long-distance calls are toll free.
A) It is based on a high-speed Internet connection to deliver voice communications. C) It results in lower phone charges for businesses because long-distance calls are toll free. *To use the VoIP effectively, a high-speed Internet connection must be in place. VoIP uses the Internet connection. It does not require a landline to make phone calls; therefore, all long-distance calls are toll-free, resulting in lower operating costs.
Over the next five years, what type of devices will surpass Internet access from personal computers? A) Mobile B) Chrome C) Laptops
A) Mobile *Mobile devices such as smartphones will surpass personal computers accessing the Internet.
A communication protocol is defined as a set of rules that does what? A) Rules that allow communication systems to interact B) Rules that only ethernet networks use C) Rules that only wireless networks use
A) Rules that allow communication systems to interact *The rules allow communication systems to interact and communicate with and transmit information to each other. Telecommunication protocols are created by governing bodies to define how data are communicated over the networks. Popular examples of telecommunications protocols include the 802.3 standard and the TCP/IP.
What is meant by wireless networks being scalable? A) Scalability refers to the ability to grow user base and data services with ease, built into the infrastructure. B) Scalability refers to the ability to expand range built into the infrastructure. C) Scalability refers to the ability to grow at fixed costs.
A) Scalability refers to the ability to grow user base and data services with ease, built into the infrastructure.
Which of the following is NOT a computer network hardware device? A) Sniffer B) Router C) Switch D) Hub
A) Sniffer *A sniffer or packet analyzer is used to monitor or log traffic on a network for troubleshooting or analysis, but is not a network hardware device.
PPP previously operated a Wi-Fi network, but the computer was hacked on several occasions due to the lack of password protection on either the wireless router or the computer. What is the name of the initial technique that a hacker would use to gain initial access to the computer via a wireless network? A) Sniffing B) Probing C) Spoofing
A) Sniffing *Sniffing a wireless network can lead to network spoofing and probing, in which the network is tricked into providing hackers with sufficient information to access the network.
Because of limited funding, the bookstore employees are still using this very old and unsecure method to log on to the company's server from home. A) Telnet B) HTTPS C) FTP D) SMTP
A) Telnet *Telnet is a very old and insecure method of accessing a remote network. The company should consider upgrading to one of the many newer and more secure forms, which include secure shell (SSH) and Remote Desktop Protocol (RDP).
What best describes the implications of the Internet of Things? A) The Internet of Things leads to automated servicing of smart devices. B) The Internet of Things replaces e-commerce. C) The Internet of Things will create robots that automate all tasks.
A) The Internet of Things leads to automated servicing of smart devices. *The Internet of Things (IoT) will make all devices and systems "smart" so they will be able to communicate via the Internet to automate servicing needs.
Wireless network installation is straightforward and can typically be done in-house, by the company IT professionals, without outside assistance. What is the key planning activity when setting up a wireless network? A) The most important activity is determining access points and locations. B) The most important activity is determining the number of users. C) The most important activity is determining how to access the Internet backbone.
A) The most important activity is determining access points and locations. *Access point number and location have significant impact on performance.
Why do communications networks use defined rules or standards called protocols? A) To ensure communication between packets is accurate and understood. B) To ensure communication between devices is encrypted. C) To ensure communication between devices is rapid.
A) To ensure communication between packets is accurate and understood. *In communications networks, data are transmitted by devices, travel over a medium, and are received by other devices. Protocols are used to ensure the transmission of digital data communicated in packets between devices is accurate and understood by the receiving device.
What does TCP/IP stand for? A) Transmission Control Protocol/Internet Protocol B) Total Communication Protocol/International Protocol C) Technical Communication Products/Internet Program
A) Transmission Control Protocol/Internet Protocol *TCP/IP stands for Transmission Control Protocol/Internet Protocol and is the communication rule of the Internet.
How are WAN networks interconnected? A) Via the Internet, private networks, and the public switched telephone network B) Via Ethernet network technology components C) Via the plain old telephone system (POTS)
A) Via the Internet, private networks, and the public switched telephone network *WAN networks are collections of remote business campuses that use the Internet, private, and public switched networks.
A company that wants to monitor warehouse temperatures across various locations can deploy -Select-. A) WSNs B) RFIDs C) barcodes
A) WSNs *WSNs are used to monitor physical or environmental conditions in processes or in locations.
Wireless LAN can offer businesses greater productivity and cost savings. What else is true about wireless LAN networks? A) Wireless LAN networks can be easily changed and configured. B) Wireless LAN have better data transmission rates. C) Wireless LAN have no user number limitations.
A) Wireless LAN networks can be easily changed and configured. *Wireless LANs are more scalable than wired networks and can be easily configured and changed in any topology.
WAN networks are interconnected via the Internet, private networks, -Select-. A) public switched telephone networks B) local area networks C) corporate area networks
A) public switched telephone networks *WANs are interconnected through the Internet using IP protocol, or through private networks and even through the POTS, the plain old telephone system.
The Network address translation (NAT) technology allows private users to -Select-. A) redefine network addresses to assign their own addresses B) use Virtual Private Networks to remote into a smart phone C) help users set up wireless networking in the home environment for gaming
A) redefine network addresses to assign their own addresses
Large business enterprises require core routers in their telecommunications computer network to support multiple telecommunications interfaces of the highest speed. What else does a core router do? A) A core router is the fastest router. B) A core router operates in the Internet backbone. C) A core router links LANs together.
B) A core router operates in the Internet backbone. *A core router is very powerful (and expensive), and is used to aggregate data and connect the enterprise to the Internet in the backbone in order to handle large amounts of traffic.
Why do home office or small business computer networks sometimes use a peer-to-peer topology? A) A peer-to-peer topology helps manage a centralized database. B) A peer-to-peer topology allows file sharing between computers. C) A peer-to-peer topology offers faster network performance.
B) A peer-to-peer topology allows file sharing between computers. *Small business or home networks often do not have a server computer, therefore peer-to-peer is more desirable.
You are enrolled in a traditional course at your university. The instructor and you can communicate synchronously, face-to-face, in the classroom. However, you can also communicate with your instructor outside the classroom at any time, asynchronously, using which of the following Internet applications? A) Online chat B) Bulletin board C) Instant message (IM) D) Video conferencing
B) Bulletin board *Bulletin board is an asynchronous communication tool; therefore, you and your instructor can communicate with each other at any time, asynchronously, outside the classroom setting.
In asynchronous communications, two people in separate locations can communicate with each other during different times of the day. Which is an example of asynchronous communication: A) Asynchronous communication at the same time B) Collaboration among participants via online message boards C) Synchronous communication in different places
B) Collaboration among participants via online message boards
The Internet has become a valuable tool for businesses. Which of the following is NOT a business benefit of the Internet? A) Gain intelligence to improve processes B) Conduct personal matters C) Surveillance on competitors D) Interact with suppliers
B) Conduct personal matters *Although access to the Internet allows employees to save time and potentially improve productivity, using the Internet for personal matters can cause employees to waste time and the business may lose productivity to personal aims. For this reason, many businesses restrict employees from accessing part of or the entire Internet.
What information is enclosed in transmission packets? Select the most accurate statement. A) Data packets include destination address and router data only. B) Data packets include destination address, relay information, and error detection. C) Data packets include router data and information cargo only.
B) Data packets include destination address, relay information, and error detection. *Among other things, data packets have the destination IP address, the actual information to be sent, which can be parceled into many other packets, and error detection in case transmission fails.
Telecommunications technology has always been essential to business. What is the best definition of telecommunications? A) Talking to someone via a wireless device B) Exchanging information via electrical signals C) Connecting to the Internet via a browser
B) Exchanging information via electrical signals *Telecommunications is achieved by exchanging information (sending or receiving) between various entities over electrical, electromagnetic, or digital networks over short and long distances.
Which of the following is a disadvantage of using a VPN? A) Secure B) Expensive C) Flexible
B) Expensive
Surveymonkey.com is a good website for businesses to collect information from its customers. A) Interact with suppliers B) Gain intelligence C) Interact with customers D) Sell digital goods
B) Gain intelligence *There are several survey sites that allow businesses to collect opinions or information from their customers and potential customers.
The bookstore customers use this method to visit the website to order books and check on their order status. A) Telnet B) HTTPS C) FTP D) SMTP
B) HTTPS *HTTPS uses HTTP and the SSL technology to encrypt and decrypt data between the bookstore customers and the web server.
Frameworks and standards were developed to help businesses manage the development of complex systems due to the explosion of the Internet. Which of the following is NOT a framework or standard developed to deal with the complex systems? A) ISO 20000 B) ISO 20 C) COBIT D) ITIL
B) ISO 20 *ISO stands for International Organization for Standardization. ISO 20 is not an ISO standard. The two frameworks are ITIL and COBIT and the standard is the ISO 20000.
Companies and individuals who are not able to connect directly to the Internet through a local area network (LAN) server could access the Internet by subscribing or connecting to which of the following? A) IETF B) ISP C) IEEE D) ISO
B) ISP *ISP stands for Internet Service Provider. It is a paid service, whereby individuals and organizations can subscribe to the provider to have access to the Internet services.
The converged communications structure is based on what? A) Intranet, radio communications, and the PSTN B) Internet, audio communications, and the PSTN C) Extranet, audio communications, and the PSTN
B) Internet, audio communications, and the PSTN
What is a key trend in mobile communications that businesses must be aware of? A) Mobile communications is faltering because of lack of security. B) Mobile access to the Internet is growing exponentially. C) Mobile networks will replace wired networks.
B) Mobile access to the Internet is growing exponentially.
Which of the following is not a wireless telecommunication networking protocol? A) Bluetooth B) POP C) Wi-Fi
B) POP
What is the public switch telephone network (PSTN)? A) PSTN is the old telegraph analog system. B) PSTN is the voice telephone network around the globe. C) PSTN is the wire line infrastructure.
B) PSTN is the voice telephone network around the globe.
What is a benefit of packet switching? A) Packet switching compiles all data to be transmitted in one packet. B) Packet switching does not need a dedicated network connection. C) Packet switching cannot handle multi-media transmission, which can be expensive to send.
B) Packet switching does not need a dedicated network connection.
What is the advantage of RFID passive tags? A) Passive tags emit or reflect optical signals. B) Passive tags leverage energy from radio signals. C) Passive tags use battery power.
B) Passive tags leverage energy from radio signals.
Which of the following is not applicable to RFID tags? A) RFID tags can be active via battery power. B) RFID tags can be inactive. C) RFID tags can be active. D) RFID tags can be passive.
B) RFID tags can be inactive *RFID tags can be passive but not inactive. That is, they must respond or be powered by readers or interrogator signals.
Sniffing can occur in any type of network. Why is it easier to sniff a wireless network than a wired, landline network? A) Sniffing a wireless network is easier because radio frequency data are not encrypted. B) Sniffing a wireless network is easier because traffic can be easily intercepted. C) Sniffing a wireless network is easier because the technology is more advanced.
B) Sniffing a wireless network is easier because traffic can be easily intercepted. *While both networks can be sniffed, because wireless network traffic is airborne, it can be more readily intercepted.
Which of the following is not a modern telecommunications system technology? A) VoIP B) Telegraph C) Satellite
B) Telegraph *The telegraph was the most prevalent telecommunications network in the late nineteenth century.
The advantage of radio frequency identification (RFID) includes which of the following? A) The ability to operate by line of sight between items scanned and readers B) The ability to operate within close proximity of readers C) It is very expensive D) It is fast and very reliable
B) The ability to operate within close proximity of readers *Radio frequency identification only requires close proximity to the sensor in order to be read. It operates by line of sight between the item being scanned and the handheld reader.
When would client computers using TCP/IP in a client/server network not be able to communicate with each other? A) When clients are implemented on different networks B) When a client computer is offline and not connected to the Internet C) When clients are implemented on different hardware and software platforms
B) When a client computer is offline and not connected to the Internet
Which of the following best describes the first generation of mobile networks? A) 1G networks were "data digital" networks. B) 1G networks were "optical data" networks. C) 1G networks were "voice only" analog communication networks.
C) 1G networks were "voice only" analog communication networks.
4G networks provide IP-based voice, data, and multimedia traffic at what speed? A) 4G networks offer data speed of up to 1Mbit per second. B) 4G networks offer data speed of up to 1GB per second. C) 4G networks can carry traffic as fast as 1Gbit per second.
C) 4G networks can carry traffic as fast as 1Gbit per second. *4G network traffic speed is between 100Mbps to 1Gbit per second.
What is the function of a network bridge? A) A network bridge connects virtual hosts together. B) A network bridge is a simple switch. C) A network bridge links two network LANs together.
C) A network bridge links two network LANs together.
What is a network host? This is also known as data terminal equipment in computer networking hardware. A) A network host is a central switching computer. B) A network host is a database system. C) A network host is a physical node with an IP address.
C) A network host is a physical node with an IP address. *A network host is a computer or a physical node, with an Internet Protocol (IP) address connected to a network.
A network protocol designed to handle broadband integrated services such as voice and video is -Select-. A) Ethernet B) IP C) ATM
C) ATM *ATM stands for Asynchronous Transfer Mode and was designed to provide quality of data of voice and video via circuit switching.
What is the difference between an analog signal and a digital signal? A) Analog signals are electrical, while digital signals are optical. B) Analog signals carry voice while digital signals carry data. C) Analog signals are continuous while digital signals are not continuous.
C) Analog signals are continuous while digital signals are not continuous. *Analog signals are continuous electrical waveform signals while digital signals are discrete, binary, noncontinuous electrical waveforms.
RMD requires a telecommunications network that will carry voice, video, and data. What is this an example of? A) Internet of Things B) Protocol C) Convergence
C) Convergence *The ability for a telecommunication network to carry voice, data, and video is called convergence.
What is the purpose of the Domain Name System? A) Converts MAC addresses to IP addresses B) Converts TCP/IP protocol to IP addresses C) Converts domain names to IP addresses D) None of the above
C) Converts domain names to IP addresses *Every host connected to the Internet has a unique IP address that is difficult to use and remember. Therefore, the Domain Name System (DNS) converts unique IP addresses to domain names, such as Google.com to its IP address (i.e., 216.58.217.206).
The part-time employees used this old and unsecured technology to transfer files between the bookstore's server and their home computers. A) Telnet B) HTTPS C) FTP D) SMTP
C) FTP *This is an unsecure method used to transfer files from one computer to another.
Which of the following is a governing agency that determines what is and is not acceptable on the Internet? A) World Wide Web Consortium (W3C) B) Internet Architecture Board (IAB) C) Federal Communications Commission (FCC) D) Internet Corporation for Assigned Names and Numbers (ICANN)
C) Federal Communications Commission (FCC) *The governing bodies that define standards and help with the continuity of communications on the Internet include: IAB, ICANN, W3C, IETF, and IEEE, but FCC is the only governing agency that determines what is and is not acceptable on the Internet.
The website for healthcare corporations, such as Anthem Blue Cross Blue Shield, contains tons of medical information and ways to stay healthy. A) Interact with suppliers B) Gain intelligence C) Interact with customers D) Sell digital goods
C) Interact with customers *Corporations often utilized their websites as a means to communicate important information to their customers.
The designers are considering the addition of a small showroom in which they can showcase the smart technology of the appliances and lighting that is available. This would be an example of -Select-. A) social media B) hypervisors C) Internet of Things
C) Internet of Things *The term Internet of Things means that in the future, all devices, including appliances, cars, networks, systems, etc., will be connected to the Internet.
Bluetooth is a wireless technology that allows the exchange of data. Why is this technology a benefit to business? A) It has a very long range. B) It uses a wireless frequency spectrum. C) It is relatively easy to configure. D) It uses 5.6GHz communications.
C) It is relatively easy to configure. *Bluetooth is a benefit to business because it is wireless, allows for easier communication, and is very easy to configure.
4G cellular technology has enabled increased capabilities in all the following areas except what? A) GPS services B) Mobile devices C) Landline phones D) Video streaming
C) Landline phones *A landline phone is a permanent, unbroken connection of cables and does not use 4G.
To determine the best location for access points, what assessment should be conducted? A) The need for Ethernet B) Fiber-optic capability C) RF site survey D) Analysis of the 2.4GHz band
C) RF site survey *To ensure optimal network performance, an RF site survey should be performed to locate the best location for wireless network access points.
Wireless threats come in all shapes and sizes and can be destructive to a business. What is meant by sniffing a wireless network? A) Sniffing is the act of hacking into the network. B) Sniffing is the act of falsifying data encryption. C) Sniffing is the act of intercepting network traffic.
C) Sniffing is the act of intercepting network traffic. *Sniffing is the act of eavesdropping and capturing traffic data packets and decoding them into a readable format.
Which of the following best defines social media in today's information age? A) Social media is a popular Big Data application. B) Social media is a new media replacing TV and radio. C) Social media are Internet-based applications where users interact with one another.
C) Social media are Internet-based applications where users interact with one another. *Social media is a new medium that is Internet based, and allows user to share ideas or information.
Why should businesses have a social media strategy? A) All business over the Internet comes from social media. B) Social media is an e-commerce business platform. C) Social media is an ubiquitous marketing channel.
C) Social media is an ubiquitous marketing channel.
The impact of the Internet on the scope of information systems is large. Which of the following statements about the impact of the Internet is false? A) The Internet's effect on the scope of information systems is that of a multiplier. B) At the very least, the Internet is little more than another channel through which businesses do business. C) The Internet has created a simplified network of client-server computers. D) The Internet is an enabler to business intelligence and data mining tools.
C) The Internet has created a simplified network of client-server computers. *The impact of the Internet has resulted in a very extensive and complex interconnected network that spread out over the entire globe.
Corporations have used private branch exchanges (PBX) for many years to manage their own internal phone systems. Which of the following statements about private branch exchanges (PBX) is false? A) The PBX eventually evolved into specialized PBX computers. B) PBX is based on telephone technology. C) The Internet is the backbone for PBX.
C) The Internet is the backbone for PBX. *The PBX system is based on the telephone technology and does not require the Internet to function.
Computer networks enable circuit switching. What does this mean? A) They create a point-to-point analog circuit. B) They create a point-to-point digital connection. C) They create a point-to-point packet digital circuit in circuit switching. D) None of the above.
C) They create a point-to-point packet digital circuit in circuit switching. *Computer networks create a point-to-point packet digital circuit in circuit switching, which allows point-to-point communication.
The Internet was developed based on the revolutionary telephone technology. Which of the following is NOT an innovative application provided by the Internet? A) Web-enabled storefront B) Cloud storage C) Ticker tape device D) Web forms
C) Ticker tape device *The ticker tape device, which allowed for continuous communications between regionally separated parties, was invented before the Internet.
How is voice or video information carried on digital networks? A) Voice and video data are transmitted in packet switched networks. B) Voice and video data are transmitted in continuous digital waveforms. C) Voice and video data are transmitted using circuit switching methods.
C) Voice and video data are transmitted using circuit switching methods. *Voice and video data are packetized, but transmitted on circuit switching networks instead of packet switching networks.
WEP and WPA are protocols embedded in both hardware and the operating system; they are part of the wireless network's Open System Interconnection (OSI) layer of encryption and always in place for all wireless networks. What is the difference between the WEP and WPA encryption protocol? A) WEP is used in public Wi-Fi networks while WPA is used in business LAN networks. B) WEP is for analog encryption while WPA is for digital encryption. C) WEP is a legacy wireless encryption protocol that has been replaced by a more secure protocol called WPA.
C) WEP is a legacy wireless encryption protocol that has been replaced by a more secure protocol called WPA. *WEP has been replaced by a more secure protocol called WPA.
A(n) -Select- network is able to carry data, voice, and multimedia information. A) analog B) digital C) converged
C) converged *Convergence means the ability to carry voice, data, and video.
The ability for a telecommunication network to carry voice, data, and video is called -Select- . A) TCP/IP B) digital C) convergence
C) convergence *The ability for a telecommunication network to carry voice, data, and video is called convergence.
Social media, mobile devices, and -Select- are three growing trends in the business sector that have wide implications and offer opportunities and risks. A) VoIP B) convergence C) cyber security
C) cyber security *Social media, mobile networking, and cyber security are important growing trends in information technology.
A network host is a -Select- in a data communications network and is assigned an IP address. A) computer B) router C) node
C) node *A network host or data terminal equipment is a node in a network.
A -Select- is a set of rules applied to data switched networks to ensure quality and accuracy of signal transmission and reception. A) standard B) regulation C) protocol
C) protocol *In telecommunications, rules are applied to data switched networks to ensure accurate and quality of data communication.
Large organizations leverage -Select- network management applications to better handle changes and moves. A) physical B) duplicate C) virtual
C) virtual *Virtual network management applications are used to manage moves and changes more productively.
The Internet is an extensive, public communications system that has a tremendous impact on which of the following areas? A) Scope of information systems B) Management of computer-based systems C) Implementation of systems D) All of the above
D) All of the above *The Internet impacts all of these: the scope, implementation, and management of today's computer-based information systems.
Using a web server to connect to the corporate databases on the cloud, an intranet can provide many benefits. Which of the following is NOT a benefit of an intranet? A) Email and collaborative software B) Centralized information sharing C) Centralized storage repository D) Customer communication
D) Customer communication *An intranet is a network connection meant for internal use only, not to communicate with customers.
Which of the following application provided by the Internet allows a business to store helpful documents to be accessed by its stakeholders, either for free or for a fee? A) Web forms B) Electronic communications C) Electronic Data Interchange D) Information repositories
D) Information repositories
While managing the IT department for a small business, you find that the Internet provides your company with various applications to communicate with customers, but you are trying to find a solid form of communication that is not email, instant messaging, or videoconferencing based. Which option should be chosen? A) EDI B) TCP/IP C) DNS D) None of the above
D) None of the above *Every application of the Internet has its benefits and disadvantages. It will vary based on the goals of the business and their communication needs.
Employees and the business owner communicate via emails using this protocol. A) Telnet B) HTTPS C) FTP D) SMTP
D) SMTP *Besides IMAP and POP3, this is another popular email protocol.
Students can buy e-books and access codes directly from the textbook publishers' websites. A) Interact with suppliers B) Gain intelligence C) Interact with customers D) Sell digital goods
D) Sell digital goods *Textbook publishers such as Pearson and McGraw-Hill yield a bigger profit margin from selling digital goods to students.
The -Select- layer in the OSI (Open System Interconnection) model defines the electrical and physical specification of the device and transmission medium. A) transport B) data C) session D) physical
D) physical *The physical layer specifies the device to transmission medium connection.
Telecommunication networks transmit data, voice, and -Select- over long distances. A) files B) information C) electricity D) video
D) video *Telecommunications networks are able to transmit video, which is also called broadband due to its intensive data bandwidth requirement.
Spoofing a network is a false representation of digital identity and leads to less packet encapsulation information as the network responds. True or False
False
When installing a wireless LAN, the access points must be configured to TCP/IP and 4G protocols. True or False
False
The VoIP, video conferencing, and multimedia communications at RMD will now be managed with packet switching. True or False
False *Circuit switching is used for VoIP applications, as well as video conferencing, video, and multimedia communications.
You are installing a new network for a small business. Your client makes the statement, "Businesses, regardless of size, need hubs, switches, and routers to access the world wide web." Is this true or false? True or False
False *Large business might require significant network equipment in order to optimize network performance, but small businesses can manage with only a router.
The telecommunications innovation is nothing new; it started 30 years ago with the founder of the telephone, Mr. Samuel Morse. True or False
False *Mr. Samuel Morse and others invented the telegraph in the 1820s. Mr. Alexander Graham Bell was the inventor of the telephone more than 130 years ago, which evolved from the telegraph.
WSNs have sensors that need to be wired into a network in order to transmit and receive signals. True or False
False *Sensors in WSNs are able to transmit and receive signals via built-in antennas.
The 802.3 standard, created in 1983 by the Institute of Electrical and Electronics Engineers (IEEE), is also known as the Internet standard. True or False
False *The TCP/IP, which defines how data are relayed between networks, is the Internet standard. 802.3 is an Ethernet standard and defines local area network (LAN) connections.
One downside of convergence is that when the network goes down, you only have traditional telephone service. True or False
False *There is no telephone service when a convergence network is inoperable.
Wireless network security is improving because of the new security protocol called WEP. True or False
False *WEP, or Wired Equivalent Privacy, was replaced by Wi-Fi Protected Access (WPA).
Data packet switching is more efficient than circuit switching because it leverages the entire computer network capacity. True or False
True *Data packet switching can be broken up and sent throughout the entire network to be reassembled at the destination.
If you were building out a telecommunications network and wanted to take signals and data packets from multiple devices and combine them into a single device, you would use a multiplexer. True or False
True *Data signals travelling over computer networks are combined together by the use of a multiplexer.
The increasing complexity of the new computer systems resulted in the development of two frameworks Information Technology Infrastructure Library (ITIL) and the Control Objectives for Information and Related Technology (COBIT). True or False
True *The Information Technology Infrastructure Library (ITIL) and the Control Objectives for Information and Related Technology (COBIT) framework were created to allow businesses to better plan their infrastructure, manage IT services, control changes, and reduce complexity as the scale of their information systems grew.
It is fiscally too expensive to upgrade wireless Wi-Fi access points built before 2003 (which have WEP encryption protocol) to the more secure WPA standard. True or False
True *The changes in firmware required to upgrade to WPA are too expensive. Access points with WEP are therefore more vulnerable to hacks.
WPA2 has replaced WPA as an encryption protocol. True or False
True *WPA2 has replaced WPA as the standard Wi-Fi encryption protocol.
Wireless business networks enable workers to access information from anywhere, but they also create vulnerabilities to business information systems. True or False
True *Wireless networks allow access to company information from anywhere, but they are more easily hacked.