Chapter 7

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

In this​ video, Kevin describes​ _____ as a set of integrated software modules that support nearly all of their​ organization's business processes.

ERP

What is the name of the organization responsible for assigning public IP​ addresses?

ICANN

Which of the following is FALSE about the​ TCP/IP protocol?

IP helps to recover any packets that are lost or damaged during transmission.

Which of the following​ TCP/IP application-layer protocols is used for email​ transmission?

SMTP

A company needing reliable network speeds at 1.5 Mbps would probably need to lease a​ dedicated:

T1 line

The Internet is based on which of the following three key​ technologies?

​Client/server computing, packet​ switching, and​ TCP/IP and related communications standards for linking networks and computers

According to the information in this​ video, the telephone system is an example of a​ _____ network.

​circuit-switched

In this​ video, Special Agent Macey says the single largest threat to the Internet is​ _____.

​denial-of-service attacks

Bandwidth is determined​ by:

determining the difference between the highest and lowest frequency on a channel.

If you wanted to have wireless connectivity in your home or​ apartment, you would need a​ _________________ to move packets of data to your different devices.

router

​A(n) __________________ is a way to communicate in a network that is recognized by a continuous​ waveform:

analog signal

In this video​ dramatization, Kevin describes which component of an ERP system that consolidates data from​ sales, marketing, and service​ departments?

customer relationship management​ (CRM)

Network signals that are represented by​ on-off pulses indicate​ a(n):

digital signal.

As Kevin​ explains, _____ processes support activities in multiple departments and span an organization.

enterprise

According to the information provided in this​ video, any business that has an online presence is at risk of​ _____.

exposure to hacker activity B. ​denial-of-service attack C. unauthorized data disclosure D. loss of customer data E. all of the above

According to the DHS agent portrayed in this​ video, the Secret Service has responded to network intrusions at businesses throughout the United States that have been impacted by​ _____ through their​ point-of-sale systems.

malware

As Zero and One explain in this​ video, a​ _____ must be used to convert an analog signal to a digital signal when transmitting data through a typical telephone line.

modem

At its most basic​ level, a(n)​ _________ simply consists of two computers that are connected together.

network

Microsoft Windows Server and Linux are examples​ of:

network operating systems.

In this​ video, One-Bit describes​ _____, the method of slicing digital messages into​ parcels, transmitting them across communication​ networks, and reassembling them at their destination.

packet switching

The method of slicing digital messages into​ parcels, transmitting them along different communication​ paths, and reassembling them at their destinations is called​ ________.

packet switching

In this​ video, Agent Macey explains how a​ _____ pretends to be a legitimate company and sends email requesting users to update their confidential information such as passwords or account numbers.

spoofer

A company needing a network to connect its offices in​ Montana, Idaho, and Utah would require​ a:

wide area network.

If you are creating a network using​ twisted-pair (CAT​ 5) wire, the cable​ shouldn't exceed:

100 meters.

Which of the following could represent a current IP​ address?

207.46.250.119

Education being represented by .edu and business represented by .com are examples​ of:

top level domains

According to the information in this​ video, computers represent data using​ _____.

bits

Based on the information provided in this​ video, which of the following usually happens in a​ denial-of-service attack?

A hacker floods a Web server with so many requests that it becomes unavailable to its intended users.

​Mary's company is implementing an ERP system to achieve which main business​ objective?

improved decision making

A​ ________ is a set of rules that programs on two communicating devices follow.

protocol

analog signal.

The signal from your iPod earphone is​ a(n):

In the Dundee Precious Metals​ (DPM) case, what technology was added to dramatically increase productivity and improve​ safety?

An underground wireless​ Wi-Fi network

Which of the following is a wireless protocol designed for transmitting data over short​ distances, replacing​ cables?

Bluetooth

Which single word below best describes Web​ 2.0?

Dynamic

Which of the following is NOT a function of the Internet service provider​ (ISP)?

The ISP provides applications services.

Which of the following is FALSE about the Domain Name Service​ (DNS)?

The first name in the domain name is the organization name.

Which is the BEST definition of​ hertz?

The number of cycles per second that can be sent through a medium

According to this​ video, which of the following statements is true regarding enterprise resource planning​ systems?

They integrate data with a centralized database.

In this​ video, One-Bit describes how voices travel through typical telephone transmission lines. He is describing​ a(n) _____.

analog signal

If you were building a network intended to service two buildings that were next to each​ other, you would construct​ a:

local area network.


संबंधित स्टडी सेट्स

Chapter 07: Health Promotion of the Newborn and Family

View Set

Roles of the Media in Politics/Elections

View Set

(Exam 1) Chapter 11: Health Care of the Older Adult

View Set

Computer Programming Chapters 4-6 (Test 2)

View Set

Principles of Management chapter 1-4 test

View Set

ESTRUCTURA | 7.2 Indefinite and negative words- Alguno o ninguno

View Set

Chapter 6 Security Technology: Access Controls, Firewalls, and VPNs

View Set