MIS Cronk 7

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The WiMax standard can transmit up to a distance of approximately:

30 miles.

Which of the following is the best description of a protocol in a telecommunications network architecture?

A standard set of rules and procedures for control of communications in a network

The most common web servers today are:

Apache HTTP Server and Microsoft IIS.

The most appropriate wireless networking standard for creating PANs is:

Bluetooth.

A network that spans a college or corporate facility is called a:

CAN

Instant messaging is a type of ________ service.

Chat

The Internet is based on which three key technologies?

Client/server computing, packet switching, and the development of communications standards for linking networks and computers

What service converts IP addresses into more recognizable alphanumeric names?

DNS

Which signal types are represented by a binary waveform?

Digital

In TCP/IP, IP is responsible for which of the following?

Disassembling and reassembling packets during transmission

Which of the following is not one of the top five search engines?

Facebook

Computer networks are based on the same principles as telephone networks.

False

NFC tags are always passive.

False

RFID technology is being gradually replaced by less costly technologies such as WSNs.

False

Which digital cellular standard is used widely throughout the world except the United States?

GSM

Web browser software requests web pages from the Internet using which of the following protocols?

HTTP

Which organization manages the domain name system of the Internet?

ICANN

A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers.

ISP

Macy's Pick to the Last Unit system, described in the chapter-opening case, is an example of which of the following?

IoT application

4G networks use which of the following standards?

LTE and WiMax

Which type of network is used to connect digital devices within a city or metropolitan area?

MAN

Based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business?

Managing the supply chain

Which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network?

Modem

Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations?

Packet switching

Which of the following is not a characteristic of packet switching?

Packet switching requires point-to-point circuits.

Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server?

Peer-to-peer

Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents?

Peer-to-peer network

Which of the following statements about RFID is not true?

RFIDs require line-of-sight contact to be read.

Which of the following pulls content from websites and feeds it automatically to a user's computers?

RSS

Which of the following is a device that sends packets of data through different networks assuring they go to the correct address?

Router

Which of the following can be used to help a website achieve a higher ranking with the major search engines?

SEO

________ monetizes the value of the data stored by search engines.

Search Engine Marketing

Which of the following is not a defining feature of Web 2.0?

Semantic search

On which of the following protocols is the Internet based?

TCP/IP

Which of the following statements is not true about search engines?

There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

A NOS must reside on all the local computers in a network.

True

A computer network consists of at least two computers.

True

A hub is a networking device that sends packets of data to all other devices on the network.

True

Apple Pay uses an RFID-related technology called near field communication.

True

Bandwidth refers to the range of frequencies that can be transmitted by a telecommunications channel.

True

By 2018, it is estimated that more than 200 million Americans will use mobile search.

True

Client/server computing has largely replaced centralized mainframe computing.

True

Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.

True

Computer networks that use packet switching are much more efficient than telephone networks that use circuit switching.

True

Digital rights activists believe differentiated pricing violates net neutrality principles.

True

Fiber-optic cable is more expensive and harder to install than wireless media.

True

In a client/server network, a network server sets the rules of communication for the network.

True

In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.

True

In addition to being an online retailer, Amazon is also a powerful product search engine.

True

Mobile search makes up more than 50% of all Internet searches.

True

TCP/IP was developed during the early 1970s to support efforts to help scientists transmit data among different types of computers over long distances.

True

The "Internet of Things" refers to a vision of a pervasive Web, in which common objects are connected to and controlled over the Internet.

True

The Domain Name System (DNS) converts domain names to IP addresses.

True

The Internet of Things is based on billions of Internet-connected sensors throughout the physical world.

True

Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.

True

VoIP technology delivers voice information in digital form using packet switching.

True

Web 3.0 is an effort to add a layer of meaning to the existing web in order to reduce the amount of human involvement in searching for and processing web information.

True

Wikis allow visitors to change or add to the original posted material.

True

Which process is used to protect transmitted data in a VPN?

Tunneling

________ integrate disparate channels for voice communications, data communications, instant messaging, email, and electronic conferencing into a single experience.

Unified communications

The 802.11 set of standards is known as:

Wi-Fi.

A network that covers entire geographical regions is most commonly referred to as a(n):

Wide Area Network

A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.

access point

T1 lines:

are high-speed, leased data lines providing guaranteed service levels.

In the domain name "http://books.azimuth-interactive.com", which element is the second-level domain?

azimuth-interactive.com

All of the following are physical components of an RFID system except:

bar codes.

The total amount of digital information that can be transmitted through any telecommunications medium is measured in:

bps

The telephone system is an example of a ________ network.

circuit-switched

IPv6 has been developed in order to:

create more IP addresses.

Bandwidth is the:

difference between the highest and lowest frequencies that can be accommodated on a single channel.

A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits.

digital

Client/server computing is a:

distributed computing model where clients are linked to one another through a network that is controlled by a network server computer.

Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication.

eight

One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as:

hotspots.

Shopping bots use ________ software for searching the Internet.

intelligent agent

A VPN:

is an encrypted private network configured within a public network.

The backbone networks of the Internet are typically owned by long-distance telephone companies called:

network service providers.

Digital subscriber lines:

operate over existing telephone lines to carry voice, data, and video.

Predictive search in Google's search engine:

predicts what you are looking for as you enter words into the query box.

Wireless sensor networks (WSNs) are used for the following tasks except:

processing consumer transactions.

The concept of a future web in which it is commonplace for everyday objects to be connected, controlled, or monitored over the Internet is called:

the Internet of Things.

The domain .gov is a(n):

top-level domain.

Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n):

uniform resource locator.

A(n) ________ is software for locating and managing stored web pages.

web server


संबंधित स्टडी सेट्स

AD BANKER AL P&C PRACTICE COMP EXAM

View Set

Week 5: Traveling Waves and Sound

View Set

GMetrix ESB: Production & Distribution Training Mode

View Set

II. Platelets (aka. Thrombocytes):

View Set

5.3 Valuation and DCF Analysis - DCF Analysis: Calculating Free Cash Flow

View Set