MIS Computer Networks

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Put the steps of cellular communication (placing a call on a cellular network) in the correct order, starting with placing a call.

1. Place the Call 2. Your phone converts voice into elec. signal to nearest tower 3. Call is relayed to system/network of towers then converted and received by phone youre calling 4. persons voice converted to elec. signal sent back through the network

The second-generation Internet which is based on interactivity and dynamic content and allows people to collaborate and share information online.is called Web

2

The next evolution in the development of the World Wide Web, Web ___ will include many features and tools that allow individuals to make better use of the billions of web pages on the Internet, the wide array of smartphone applications, and to make the best use of the Internet of Things (IoT).

3

Select what's true about how 5G connectivity will support IoT. More than one answer may be selected.

5G connectivity will allow for greater data capacity. 5G connectivity will allow for faster connection speeds, greater data capacity, and lower latency. 5G connectivity will allow for lower latency.

Select the potential applications/benefits of 5G networks. More than one answer may be selected.

5G connectivity will greatly improve what businesses and individuals can do with connected devices. 5G networks may eventually allow for autonomous vehicles to safely interact with each other and their environment. 5G connectivity has the potential to create truly connected cities.

Select what's true about Cloud computing in today's business environment. More than one answer may be selected.

70% of global businesses backup some portion of their data using a Cloud service provider. In the United States, 96% of all organizations use the Cloud in one form or another. 93% of small businesses backup some portion of their data using a Cloud provider.

Also referred to as Cloud security ____ services security includes policies, procedures, controls, and hardware that work together to ensure cloud-based systems are secure. Measures put into place to ensure the Cloud service is secure include data protection, regulatory compliance, customer privacy protection, and authentication rules for users and devices.

Cloud

Select all of the characteristics of that explain how the Internet works.

Data on the Internet is usually stored on specialized computers called servers. The connections points in the Internet are called nodes. Data is transferred from one network to another network through hardware called routers.

Select the true statements about sending information on the Internet.

Devices connect to the Internet or a network using network cables or wireless technologies. Each device connecting to the Internet or a network must have a network interface card (NIC) installed. Modems and routers are connected to the Internet via an Internet Service Provider (ISP).

Common methods to connect a LAN to the Internet include which of the following?

Fiber optic cables Coaxial cables Ethernet cables

There are many benefits of Cloud computing. One benefit of cloud computing is _____ that allows for the access of data, files, and programs when you are off-site or at home via web-enabled devices.

Flexibility

There are four key features of Web 2.0. One key feature allows users to collectively determine the classification of information. For example, tagging of websites, images, videos, and links. This key feature is called:

Folksonomy

Select what's true about Geographic Information Systems (GIS). More than one answer may be selected.

GIS allows for the analysis of spatial data (including geospatial data and geographic information) that is used for more informed decision making. GIS permits organizations and users the ability to store, view, and analyze geographic and geographic data in the form of multidimensional charts and maps. GIS are built on a foundation provided by the Global Positioning System (GPS).

Examples of Internet of Things (IoT) devices include which of the following? More than one answer may be selected.

Home Security Cameras Smart Speakers Smart TVs

Select the correct statements about Infrastructure as a Service (IaaS).

IaaS is an instant computing infrastructure composed of processing, data storage, and a variety of other computing resources provided by a cloud vendor. IaaS helps organizations avoid the cost of acquiring and managing their own physical servers and datacenter architecture.

An instant computing infrastructure composed of processing, data storage, and a variety of other computing resources provided by a Cloud vendor to assist in running an organization's information systems is referred to as ____ as a Service.

Infrastructure

What are the characteristics of cryptocurrency?

Its value depends largely on the supply and demand for it. It is not backed by any assets. It is not issued by a central bank.

Which of the following are examples of Software as a Service (Saas)? More than one answer may be selected.

Microsoft Office 365 Google apps Smartsheet

Select what is true about computer networks. More than one answer may be selected.

Networks range in size from small home networks to the Internet, which is the world's largest network Computer networks support many different software applications A network is a group of two or more devices/computers connected together

Web 3.0 is the next evolution in the development of the World Wide Web and is built to support a variety of applications and services including: (More than one answer may be selected.)

Ubiquitous computing Saas IoT

Select all of the correct statements about Transmission Control Protocol/Internet Protocol.

Used as a private network communications protocol for private networks including intranets and extranets A suite of communication protocols (standards/rules/guidelines) used to connect devices to the Internet Covers how software applications communicate across networks and how data packets are assembled and reassembled once they reach their destination

Virtual Private Networks (VPNs) are commonly used by organizations to securely send communications. Select the correct statements about VPNs.

VPN software authenticates the users and establishes a secure connection. A VPN creates a secure connection between two computers. Used by organizations whose employees need access to a company network remotely.

Which of the following are correct statements about web services? More than one answer may be selected.

Web services allow for the exchange of information between two systems and are not tied to any one operating system or programming language. Web services are a set of software technologies that are able to exchange information with each other using standardized web communication protocols and languages. Web services can be used to create apps that link different systems of different organizations and to build open-standard based web applications.

Cloud services security policies vary by Cloud provider, so it's important to research policies before signing a service level agreement (SLA). Some important questions to ask a vendor about Cloud services security include which of the following? More than one answer may be selected.

What type of disaster plans are in place?* Does the vendor have any specific security certifications? Does the vendor go through regular security audits?

Allowing people to share a digital ledger across a network of computers, ___ uses computer code to create concatenated (linked together) blocks of transactions.

blockchain

Software and technologies that uses computer code that creates concatenated (linked together) blocks of transactions ___ allows people to share a digital ledger across a network of computers. There is no need for a central source of control because no single entity has the ability to tamper with the records.

blockchain

Using collaboration software people from across the organization, regardless of their physical location, people can share content in real-time including documents, spreadsheets, videos, and messages. This leads to better ___ which is one of the benefits of using collaboration software.

collaboration

Geographically distributed network server groups that work together to deliver more efficient delivery of Internet and Web content are called ____ Delivery Networks (CDN)

content

This type of information system is focused on the capture, analysis, use, and management of spatial location information. It is rooted in the science of geography and seeks to integrate many types of data to create visualizations using maps and 3D scenes. This definition explains a ___ Information System.

geographic

While there are many benefits of Cloud computing, there are also some disadvantages. One of the disadvantages is __. Cloud infrastructure is owned, managed, controlled, and monitored by the Cloud service provider. This means the customer often has little control over Cloud service processes and procedures.

limited control

A type of network that connects devices at a single site within a limited geographic range is called a ___ area networks.

local

A Cloud-based computing model where Cloud service providers offer hardware and software tools need for application/software development via the Internet is called ___ as a Service. These vendors host the hardware and software needed for development on their own infrastructure that removes the need for developers to install this on their own devices.

platform

The number that is assigned to all information technology devices (routers, modems, etc.) which identifies the device and allows the device the ability to communicate with each other on a computer network, including the Internet is called an Internet ___ address

protocol

A Cloud-based service offered by vendors and hosted on a vendor's cloud that allows users to access a software application using a web browser and Internet connection is referred to as Software as a ___

service

A type of network that creates a secure connection between two computers is a ____ private network that allows for encrypted communications using the Internet for data transmission and communication.

virtual


Set pelajaran terkait

Ch 02: Looking at Computers: Understanding the Parts

View Set

Nutrition Exam 2 (more questions if it goes up to 50)

View Set

Sadlier-Oxford Vocab Level H Unit 12

View Set

Chapter 1 - Systems - Systems Analysis & Design Methods

View Set