CIS Chapter 7

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

: 3: Challenging AACSB: Information Technology LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 7) In a telecommunications network architecture, a protocol is: A) a device that handles the switching of voice and data in a local area network. B) a standard set of rules and procedures for control of communications in a network. C) a communications service for microcomputer users. D) the main computer in a telecommunications network. E) a system by which packets are sent over different networks.

: B

: 3: Challenging AACSB: Information Technology LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 53) What service converts IP addresses into more recognizable alphanumeric names? A) HTML B) DNS C) IP D) HTTP E) URL

: B

: 1: Easy AACSB: Information Technology LO: 7.2: What are the different types of networks? 31) Which type of network is used to connect digital devices within a half-mile or 500-meter radius? A) Microwave B) LAN C) WAN D) MAN E) WSN

: B

: 2: Moderate AACSB: Analytical Thinking LO: 7.2: What are the different types of networks? 34) A network that spans a city, and sometimes its major suburbs as well, is called a: A) CAN. B) MAN. C) LAN. D) WAN. E) WSN.

: B

: 2: Moderate AACSB: Information Technology LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 3) The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called: A) multiplexing. B) packet switching. C) packet routing. D) ATM. E) software-defined networking.

: B

: 2: Moderate AACSB: Information Technology LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 62) Web browser software requests web pages from the Internet using which protocol? A) URL B) HTTP C) DNS D) HTML E) FTP

: B

: 2: Moderate AACSB: Information Technology LO: 7.4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 95) A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub. A) hot spot B) access point C) server D) wireless router E) wireless sensor

: B

: 3: Challenging AACSB: Application of Knowledge LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 57) IPv6 was developed in order to: A) update the packet transmission protocols for higher bandwidth. B) create more IP addresses. C) allow for different levels of service. D) support Internet2. E) support Web 3.0.

: B

: 3: Challenging AACSB: Information Technology LO: 7.4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 92) What is the primary difference between 3G and 4G cellular systems? A) 4G systems are digital. B) 4G systems have greater transmission speeds. C) 3G systems are unable to handle web browsing. D) 3G systems have poor security. E) 3G systems are not compatible with text messaging.

: B

: 3: Challenging AACSB: Information Technology LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 74) VoIP technology delivers voice information in digital form using packet switching.

: TRUE

: 1: Easy AACSB: Application of Knowledge LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 69) Which process is used to protect transmitted data in a VPN? A) Tunneling B) PPP C) VOIP D) Packet switching E) Hypertext

: A

: 1: Easy AACSB: Information Technology LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 61) A VPN: A) is an encrypted private network configured within a public network. B) is more expensive than a dedicated network. C) provides secure, encrypted communications using Telnet. D) is an Internet-based service for delivering voice communications. E) formats web pages with dynamic links to other documents.

: A

: 1: Easy AACSB: Information Technology LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 63) Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): A) uniform resource locator. B) IP address. C) third level domain. D) root domain. E) VPN.

: A

: 2: Moderate AACSB: Application of Knowledge LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 51) Which of the following enables multiple users to create and edit web documents? A) Wiki B) Blog C) Social networking D) Pinterest E) RSS

: A

: 2: Moderate AACSB: Information Technology LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 11) Prior to the development of ________, computer networks used leased, dedicated telephone circuits to communicate with other computers in remote locations. A) VOIP B) routers C) servers D) coaxial cable E) packet switching

: A

: 2: Moderate AACSB: Information Technology LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 6) In TCP/IP, IP is responsible for: A) disassembling and reassembling of packets during transmission. B) establishing an Internet connection between two computers. C) moving packets over the network. D) sequencing the transfer of packets. E) acknowledging the packets sent.

: A

: 2: Moderate AACSB: Information Technology LO: 7.2: What are the different types of networks? 32) Which type of network serves a small group of computers, allowing them to share resources and peripherals without using a dedicated server? A) Peer-to-peer B) Wireless C) LAN D) Ring E) MAN

: A

: 2: Moderate AACSB: Information Technology LO: 7.2: What are the different types of networks? 38) Digital subscriber lines: A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are very-high-speed data lines typically leased from long-distance telephone companies. D) have up to twenty-four 64-Kbps channels. E) are based on radio signals of various frequencies.

: A

: 2: Moderate AACSB: Information Technology LO: 7.2: What are the different types of networks? 37) The total amount of digital information that can be transmitted through any telecommunications medium is measured in: A) bps. B) Hertz. C) baud. D) gigaflops. E) ROM.

: A

: 2: Moderate AACSB: Information Technology LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 54) The child domain of the root is the: A) top-level domain. B) second-level domain. C) host name. D) domain extension. E) base domain.

: A

: 3: Challenging AACSB: Analytical Thinking LO: 7.4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 94) In Europe, and much of the world, the standard for cellular services is: A) GSM. B) LTE. C) Wi-Max. D) CDMA. E) IEEE.

: A

: 3: Challenging AACSB: Information Technology LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 9) Which protocol is the Internet based on? A) TCP/IP B) FTP C) Packet-switching D) HTTP E) Telnet

: A

: 3: Challenging AACSB: Information Technology LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 70) The advanced networking consortium representing more than 500 universities, businesses, and government agencies is known as: A) Internet2. B) ICANN. C) IAB. D) W3C. E) FCC.

: A

1) The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n): A) hub. B) switch. C) router. D) NIC. E) LAN.

: B

: 1: Easy AACSB: Information Technology LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 13) A networking approach where many control functions for managing the movement of data on a network are managed by a central program separately from the network itself is known as: A) service-oriented architecture. B) software-defined networking. C) software-as-a-service. D) remote network management. E) cloud networking.

: B

: 3: Challenging AACSB: Reflective Thinking; Written and Oral Communication LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 80) What are the business advantages of using voice over IP (VoIP) technology?

: Business can lower costs by using the Internet to deliver voice information, avoiding the tolls charged by local and long-distance telephone networks. In addition, companies no longer have to maintain separate networks or provide separate support personnel for each different type of network. VoIP can reduce communication and network management costs by up to 30 percent.

: 2: Moderate AACSB: Reflective Thinking; Written and Oral Communication LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 82) Blogs, wikis, and social networking sites were designed for individuals to communicate with each other. What uses do businesses have for these tools? Give specific examples.

: Businesses can use these tools to reach out and market to potential new customers. For example, many businesses have Facebook sites to market their product to specific groups on Facebook. They can use these tools to support and give added value to existing customers. For example, a software company could have a blog that discusses in-depth use of a software product. Businesses can also use these tools within their company to communicate between departments and share knowledge. For example, a company wiki could be set up as a repository of expert information.

: 1: Easy AACSB: Application of Knowledge LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 68) Which of the following is an example of the "visual web"? A) Twitter B) Blogger C) Pinterest D) Facebook E) Google

: C

: 1: Easy AACSB: Information Technology LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 2) The Internet is based on which three key technologies? A) TCP/IP, HTML, and HTTP B) TCP/IP, HTTP, and packet switching C) Client/server computing, packet switching, and the development of communications standards for linking networks and computers D) Client/server computing, packet switching, and HTTP E) HTTP, Web 3.0, and the mobile platform

: C

: 1: Easy AACSB: Information Technology LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 5) Which of the following is not a characteristic of packet switching? A) Packets travel independently of each other. B) Packets are routed through many different paths. C) Packet switching requires point-to-point circuits. D) Packets include data for checking transmission errors. E) Packet switching makes efficient use of a network's communications capacity.

: C

: 1: Easy AACSB: Information Technology LO: 7.2: What are the different types of networks? 36) Bandwidth is the: A) number of frequencies that can be broadcast through a medium. B) number of cycles per second that can be sent through a medium. C) difference between the highest and lowest frequencies that can be accommodated on a single channel. D) total number of bytes that can be sent through a medium per second. E) number of packets sent per minute over a medium.

: C

: 2: Moderate AACSB: Application of Knowledge; Written and Oral Communication LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 85) Which of the following is a challenge posed by Wi-Fi networks? A) Lack of broadband support B) Connectivity issues with wired LANs C) Susceptibility to interference from nearby wireless systems D) High cost of infrastructure technology E) Size of access points

: C

: 2: Moderate AACSB: Information Technology LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 8) What are the four layers of the TCP/IP reference model? A) Physical, application, transport, and network interface B) Physical, application, Internet, and network interface C) Application, transport, Internet, and network interface D) Application, hardware, Internet, and network interface E) Hardware, software, transport, and application

: C

: 2: Moderate AACSB: Information Technology LO: 7.2: What are the different types of networks? 40) A LAN could be used to connect all of the following except: A) all of the computers in a large building. B) all of the devices within a 10-meter area. C) all of the computers in a city. D) all of the computers in a small office. E) all of the computers on a college campus.

: C

: 2: Moderate AACSB: Information Technology LO: 7.2: What are the different types of networks? 33) Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space whose primary need is to share documents? A) PAN B) Domain-based LAN C) Peer-to-peer network D) Campus area network E) WAN

: C

: 2: Moderate AACSB: Information Technology LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 58) Which of the following services enables logging on to one computer system and working on another? A) FTP B) LISTSERV C) Telnet D) World Wide Web E) T1 lines

: C

: 2: Moderate AACSB: Information Technology LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 64) The most common web server today, controlling 65 percent of the market, is: A) Microsoft IIS. B) WebSTAR. C) Apache HTTP Server. D) Netscape Server. E) IBM NetServer.

: C

: 2: Moderate AACSB: Information Technology LO: 7.4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 90) The 802.11 set of standards is known as: A) WLAN. B) WSN. C) Wi-Fi. D) WiMax. E) Bluetooth.

: C

: 2: Moderate AACSB: Information Technology LO: 7.4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 88) Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication. A) four B) six C) eight D) ten E) twenty

: C

: 2: Moderate AACSB: Information Technology LO: 7.4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 91) The WiMax standard can transmit up to a distance of approximately: A) 30 meters. B) 500 meters. C) 30 miles. D) 5 miles. E) 1 mile.

: C

: 3: Challenging AACSB: Information Technology LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 73) The Domain Name System (DNS) converts domain names to IP addresses.

: TRUE

: 3: Challenging AACSB: Information Technology; Written and Oral Communication LO: 7.2: What are the different types of networks? 49) What are some of the common types of physical transmission media and what differentiates them from one another?

: Common types of physical transmission media include twisted pair wire, coaxial cable, fiber-optic cable, and wireless transmission media. Twisted pair wire consist of strands of copper wire twisted in pairs for voice and data communications. Coaxial cable consists of thickly insulated copper wires capable of high-speed data transmission and resistance to interference. Fiber-optic cable consists of strands of clear glass fiber that transmit data as pulses of light generated by lasers. Wireless transmission media is based on radio signals and involves satellite microwave systems and cellular networks.

: 1: Easy AACSB: Information Technology LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 10) A ________ is special software that routes and manages communications on the network and coordinates networks resources. A) switch B) firewall C) server D) network operating system/NOS E) hotspot

: D

: 2: Moderate AACSB: Application of Knowledge; Written and Oral Communication LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 29) Which signal types are represented by a continuous waveform? A) Laser B) Optical C) Digital D) Analog E) Hybrid

: D

: 2: Moderate AACSB: Information Technology LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 12) Approximately what percentage of U.S. households has high-speed broadband connections? A) 10 percent B) 25 percent C) 50 percent D) 75 percent E) 99 percent

: D

: 2: Moderate AACSB: Information Technology LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 66) The process of employing techniques to help a website achieve a higher ranking with the major search engines is called: A) VPN. B) IAB. C) SEM. D) SEO. E) LED.

: D

: 2: Moderate AACSB: Information Technology LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 56) Which organization helps define the overall structure of the Internet? A) None (no one "owns" the Internet) B) W3C C) ICANN D) IAB E) HTTP

: D

: 2: Moderate AACSB: Information Technology LO: 7.4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 86) Which of the following statements about RFID is not true? A) RFIDs transmit only over a short range. B) RFIDs use an antenna to transmit data. C) Microchips embedded in RFIDs are used to store data. D) RFIDs require line-of-sight contact to be read. E) RFIDs can track individual units within a shipment.

: D

: 3: Challenging AACSB: Information Technology; Written and Oral Communication LO: 7.2: What are the different types of networks? 50) Which of the following is considered by many to be the defining Web 2.0 application? A) Instant messaging B) Email C) Blogging D) Social networking E) Widgets

: D

: 1: Easy AACSB: Information Technology LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 4) The telephone system is an example of a ________ network. A) peer-to-peer B) wireless C) packet-switched D) TCP/IP E) circuit-switched

: E

: 1: Easy AACSB: Information Technology LO: 7.2: What are the different types of networks? 35) A network that covers entire geographical regions is most commonly referred to as a(n): A) local area network. B) intranet. C) peer-to-peer network. D) metropolitan area network. E) wide area network.

: E

: 1: Easy AACSB: Information Technology LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 67) Which of the following statements is not true about search engines? A) They are arguably the Internet's "killer app." B) They have solved the problem of how users instantly find information on the Internet. C) They are monetized almost exclusively by search engine marketing. D) They emerged in the early 1990s as simple software programs. E) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

: E

: 1: Easy AACSB: Information Technology LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 60) ________ integrate(s) disparate channels for voice communications, data communications, instant messaging, email, and electronic conferencing into a single experience. A) Wireless networks B) Intranets C) Virtual private networks D) Telnet E) Unified communications

: E

: 1: Easy AACSB: Information Technology LO: 7.4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 93) Based on your reading of the examples in the chapter, what would be the best use of RFID for a business? A) Logging transactions B) Monitoring wireless computer networks C) Lowering network costs D) Enabling client communication E) Managing the supply chain

: E

: 2: Moderate AACSB: Information Technology LO: 7.2: What are the different types of networks? 30) To use the analog telephone system for sending digital data, you must also use: A) coaxial cable. B) a router. C) DSL. D) twisted wire. E) a modem.

: E

: 2: Moderate AACSB: Information Technology LO: 7.2: What are the different types of networks? 39) T lines: A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are used in connection with satellite Internet access. D) have up to twenty-four 64-Kbps channels. E) are high-speed, leased data lines providing guaranteed service levels.

: E

: 2: Moderate AACSB: Information Technology LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 65) What technology allows people to have content pulled from websites and fed automatically to their computers? A) FTP B) Newsgroups C) HTTP D) Bluetooth E) RSS

: E

: 2: Moderate AACSB: Information Technology LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 55) In the domain name "http://myspace.blogging.com", what are the root, top-level, second-level, and third-level domains, respectively? A) "http://", myspace, blogging, .com B) "http://", .com, blogging, myspace C) "http://", blogging, .com D) myspace, blogging, .com E) .com, blogging, myspace

: E

: 2: Moderate AACSB: Information Technology LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 52) The "Internet of Things" refers to: A) the increasing focus on shopping as the major user activity on the Internet. B) the microblogging trend, in which users exchange short text and pictures rather than longer and more in-depth content and text. C) the rise in mobile gaming. D) the trend away from platform-independent web applications to mobile-device specific apps. E) a vision of a pervasive web in which common objects are connected to and controlled over the Internet.

: E

: 2: Moderate AACSB: Information Technology LO: 7.4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 96) Networks of interconnected wireless devices that are embedded in the physical environment to provide measurements of many points over large spaces are known as: A) MANs. B) WANs. C) LANs. D) PANs. E) WSNs.

: E

: 3: Challenging AACSB: Information Technology LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 14) Which of the following is not one of the four layers of the TCP/IP communications model? A) Application layer B) Transport layer C) Internet layer D) Network Interface layer E) Local area layer

: E

: 3: Challenging AACSB: Information Technology LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 59) Instant messaging is a type of ________ service. A) mobile B) cellular C) email D) wireless E) chat

: E

: 3: Challenging AACSB: Information Technology LO: 7.4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 87) The most appropriate wireless networking standard for creating PANs is: A) I-mode. B) 802.11b. C) WiFi. D) 802.11n. E) Bluetooth.

: E

: 3: Challenging AACSB: Information Technology LO: 7.4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 89) One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as: A) touch points. B) tunnels. C) hot points. D) wireless hubs. E) hotspots.

: E

: 1: Easy AACSB: Information Technology LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 18) An NOS must reside on a dedicated server computer in order to manage a network.

: FALSE

: 1: Easy AACSB: Information Technology LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 24) TCP/IP was developed in the 1950s.

: FALSE

: 1: Easy AACSB: Information Technology LO: 7.2: What are the different types of networks? 45) An analog signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits.

: FALSE

: 2: Moderate AACSB: Application of Knowledge LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 76) An ISP is a commercial organization that owns a region of transcontinental high-speed backbone networks carrying the bulk of Internet traffic.

: FALSE

: 2: Moderate AACSB: Information Technology LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 21) Central large mainframe computing has largely replaced client/server computing.

: FALSE

: 2: Moderate AACSB: Information Technology LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 22) Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching.

: FALSE

: 2: Moderate AACSB: Information Technology LO: 7.2: What are the different types of networks? 43) The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes.

: FALSE

: 2: Moderate AACSB: Information Technology LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 78) A web server is a dedicated computer that delivers web pages to client computers.

: FALSE

: 2: Moderate AACSB: Information Technology LO: 7.4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 97) RFID technology is being gradually replaced by less costly technologies such as WSNs.

: FALSE

: 3: Challenging AACSB: Information Technology LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 19) A hub is a networking device that is used to filter and forward data to specified destinations on the network.

: FALSE

: 3: Challenging AACSB: Information Technology LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 71) Mobile search makes up approximately 10% of all Internet searches.

: FALSE

: 3: Challenging AACSB: Information Technology; Written and Oral Communication LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 28) How are modern telephone and computer networks different from what firms used in the past?

: Modern telephone and computer networks are converging into a single digital network using shared Internet-based standards and technology. Telecom companies offer full suites of telecommunication and Internet service. In the past, these two types of networks were distinct - telephone networks and computer networks performed completely different services and were not affiliated with one another. Additionally, modern communication networks are much faster and more cost effective than they were in the past.

: 2: Moderate AACSB: Information Technology LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 79) Describe and explain the idea of "net neutrality." Are you in favor of net neutrality? Why or why not?

: Network neutrality describes the current equal access by users to Internet bandwidth, regardless of the services they are using on the Internet. Network neutrality is the idea that Internet service providers must allow customers equal access to content and applications, regardless of the source or nature of the content. Presently, the Internet is indeed neutral: all Internet traffic is treated equally on a first-come, first-served basis by Internet backbone owners. The Internet is neutral because it was built on phone lines, which are subject to "common carriage" laws. These laws require phone companies to treat all calls and customers equally. For example, someone using the Internet to download large movie files pays the same rate as someone accessing their email. Now telecommunications and cable companies want to be able to charge differentiated prices based on the amount of bandwidth consumed by content being delivered over the Internet. Student opinions will vary; one might be: I support network neutrality because the risk of censorship increases when network operators can selectively block or slow access to certain content.

: 1: Easy AACSB: Information Technology LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 26) How does packet switching work?

: Packet switching is a method of slicing digital messages into parcels called packets, sending the packets along different communication paths as they become available, and then reassembling the packets once they arrive at their destinations. Packet switching makes much more efficient use of the communications capacity of a network than did circuit-switching. In packet-switched networks, messages are first broken down into small fixed bundles of data called packets. The packets include information for directing the packet to the right address and for checking transmission errors along with the data. The packets are transmitted over various communications channels using routers, each packet traveling independently. Packets of data originating at one source will be routed through many different paths and networks before being reassembled into the original message when they reach their destinations.

: 2: Moderate AACSB: Information Technology LO: 7.2: What are the different types of networks? 47) You have been hired by a small new web design firm to set up a network for its single office location. The network is primarily needed for exchanging files, accessing and managing beta websites on their web server, and connecting to the Internet. The firm hires many freelancers who come into the office on an ad hoc basis and it does not have a lot of money to spend on infrastructure. What type of network will you recommend?

: Student answers will vary. An example answer is: I would recommend a mixed Ethernet and wireless network. The Ethernet LAN would connect the web servers and primary workstations and connect via cable service to the Internet. Freelancers could connect wirelessly via access points.

: 1: Easy AACSB: Information Technology LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 16) Increasingly, voice, video, and data communications are all based on Internet technology.

: TRUE

: 1: Easy AACSB: Information Technology LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 17) To create a computer network, you must have at least two computers.

: TRUE

: 1: Easy AACSB: Information Technology LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 75) Web 3.0 is a collaborative effort to add a layer of meaning to the existing web in order to reduce the amount of human involvement in searching for and processing web information.

: TRUE

: 1: Easy AACSB: Reflective Thinking LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 72) In blogging, a trackback is a list of entries in other blogs that refer to a post in the first blog.

: TRUE

: 2: Moderate AACSB: Application of Knowledge LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 25) A router is a device that forwards packets of data through different networks, ensuring that the data gets to the right address.

: TRUE

: 2: Moderate AACSB: Information Technology LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 15) Telephone networks are fundamentally different from computer networks.

: TRUE

: 2: Moderate AACSB: Information Technology LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 20) In a client/server network, a network server provides every connected client with an address so it can be found by others on the network.

: TRUE

: 2: Moderate AACSB: Information Technology LO: 7.2: What are the different types of networks? 46) Today, most Americans connect to the Internet through broadband connections at speeds up to 15 Mbps.

: TRUE

: 2: Moderate AACSB: Information Technology LO: 7.2: What are the different types of networks? 44) In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.

: TRUE

: 2: Moderate AACSB: Information Technology LO: 7.2: What are the different types of networks? 42) Fiber-optic cable is more expensive and harder to install than wire media.

: TRUE

: 2: Moderate AACSB: Information Technology LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 77) The trunk lines of the Internet are typically owned by network service providers.

: TRUE

: 3: Challenging AACSB: Information Technology LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 23) Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.

: TRUE

: 3: Challenging AACSB: Information Technology LO: 7.2: What are the different types of networks? 41) Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.

: TRUE

: 3: Challenging AACSB: Information Technology; Written and Oral Communication LO: 7.1: What are the principal components of telecommunications networks and key networking technologies? 27) Identify the layers of the Department of Defense reference model for TCP/IP, and describe how this model works.

: The application layer enables client application programs to access the other layers and defines the protocols that applications use to exchange data. One of these application protocols is the Hypertext Transfer Protocol (HTTP), which is used to transfer web page files. The transport layer is responsible for providing the application layer with communication and packet services. This layer includes TCP and other protocols. The Internet layer is responsible for addressing, routing, and packaging data packets called IP datagrams. The Internet Protocol is one of the protocols used in this layer. At the bottom of the reference model, the network interface layer is responsible for placing packets on and receiving them from the network medium, which could be any networking technology. Data sent from one computer to the other passes downward through all four layers, starting with the sending computer's application layer and passing through the network interface layer. After the data reach the recipient host computer, they travel up the layers and are reassembled into a format the receiving computer can use. If the receiving computer finds a damaged packet, it asks the sending computer to retransmit it. This process is reversed when the receiving computer responds.

: 3: Challenging AACSB: Analytical Thinking; Written and Oral Communication LO: 7.2: What are the different types of networks? 48) What are the two types of signals used to communicate a message in a network and how are they different? What device converts one type to the other type?

: The two ways to communicate a message in a network are analog signals and digital signals. An analog signal is represented by a continuous waveform that passes through a communications medium and is used for voice communication. Examples include the telephone handset and other types of speakers that generate analog sound. On the other hand, digital signals are binary waveforms (not continuous) that communicate information as strings of two discrete states: one bit or zero bits (often depicted as strings of zeroes and ones). Computers use these types of signals and use modems to convert digital signals to analog signals.

: 2: Moderate AACSB: Application of Knowledge; Written and Oral Communication LO: 7.3: How do the Internet and Internet technology work and how do they support communication and e-business? 81) What is Web 3.0, and how do you think Web 3.0 developments could impact businesses?

: Web 3.0 is the vision of the next generation of the web in which all of the information available on the web is woven together into a single meaningful experience, such that the 500 billion web pages become more productive for the ordinary user. Sometimes referred to as the "Semantic Web," it is an effort to add a layer of meaning to existing information to reduce the amount of human time spent in searching and processing that information. Student views on the impact on businesses would vary. An example answer is: This potentially could have huge effects on businesses as simple analysis becomes mechanized, requiring fewer humans to perform this basic task.


Set pelajaran terkait

Quiz 7: Adrenal & Pituitary and Thyroid and Parathyroid

View Set

Science Chemical Symbols MEMORIZE

View Set

Public Speaking DE - Ch 16 Speaking to Persuade

View Set

Ultimate Study Guide - Test I (Period 1 and 2)

View Set

Confidence Intervals, Effect Size and Statistical Power

View Set

chapter 17 Image formation of the eye

View Set

1.02 Compare the main types of business organizations

View Set