networks and telecommunications

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The World Wide Web, introduced in the early 1990s, provided a(n) ________ interface to the Internet that launched the digital information revolution.

graphical user

____ such as cables, satellites, and routers transfer(s) the packets of data that travel over the Internet such as email, webpages, photos, music, video, and more.

hardware

Digitization, also called digitizing, is the process of transforming _______, such as text, images, and sounds, into digital representation so that it can be stored and processed by computers.

information

_______ is a research and development consortium led by more than 200 U.S. universities and supported by partnerships with industry and government to develop and deploy advanced network applications and technologies for tomorrow's Internet.

internet 2

A typical wireless home network uses a wireless access point/router to connect the network to a(n) ______.

isp

home network is a ____ area network designed for personal or business use in the home.

local

An offshoot of Internet2 that some call Internet3 is officially named the ____ LambdaRail.

national

A computer ____ is a collection of computing devices connected together to share resources such as files, software, processors, storage, printers, and Internet connections.

network

A computer ____ is a collection of computing devices connected together to share resources such as files, software, processors, storage, and printers.

networks

The look-up table approach maps information without value to ____ using a table to show the relationships.

numbers

A(n) ____ port can be used by hackers as a back door into a computer system.

open

_____ networks are useful in situations where information and/or resources are not distributed from a central source, but are shared directly among multiple sources.

p2p

A data ______ is a small group of bytes that includes the data being sent and a header containing information about the data, such as its destination, origin, size, and identification number.

packet

_____ switching and the use of routers allow the Internet to operate efficiently and effectively.

packet

A ____ area network (PAN) is the interconnection of personal information technology devices, typically wirelessly, within the range of an individual.

personal

In a computer network context, a _____ is an address used by clients and servers that is associated with a specific service.

port

NSPs enable Internet users to connect to their networks through utility stations called points of ____ (POPs).

presence

A combination of __________, hardware, and software is what makes up the Internet.

protocols

A ____ is a network device that manages network traffic by evaluating messages and directing them over the fastest path to their destination.

router

To digitize sound, a process called _____ is used to measure the amplitude of a sound wave thousands of times per second.

sampling

___________ refers to the electronic transmission and reception of signals for voice and data communications.

telecommunications

A LAN becomes a WAN when it extends beyond one geographic location to another geographic location.

true

A PAN allows your notebook computer to automatically communicate with your cell phone to connect to the Internet.

true

A computing system may be distributed over components in one small business building or around the world on a network operated by a global corporation.

true

An intranet uses the protocols of the Internet and the web, along with Internet services such as web browsers, within the confines of a private network.

true

Bluetooth devices use P2P technology to connect directly through a wireless connection.

true

Businesses and the global economy depend on the proper functioning of the Internet backbone.

true

Businesses have been investing in VoIP systems for years and saving a lot of money in the process.

true

Depending on the service and service provider, an Internet connection might be blazing fast or snail slow, filtered or unfiltered, limited or unlimited.

true

Home networking technologies can also be used to distribute media files throughout your home.

true

LANs that are designed to serve an entire city are called metropolitan area networks, or MANs.

true

Local resources are the files, drives, and printers that are connected directly to the workstation and are accessible on or off the network.

true

Many smart phones now provide access to Skype, a popular and free VoIP player.

true

Most home users take advantage of the convenience and power of Wi-Fi wireless technology for their home network.

true

Participants running software that utilizes the P2P model allow their computers to act as servers.

true

Personal area network technologies allow personal devices to communicate with or without wires, sharing data, media streams, phone conversations, and all types of information.

true

Pharming replaces the IP addresses in a DNS with the IP addresses of fraudulent websites designed to spread malware.

true

Port numbers can be used to track user activity on the Internet.

true

Port numbers help servers organize the data packets they manage, sending packets to the correct software for service.

true

Registering a domain name does not provide you with your own website, only with ownership of the name.

true

Routers are typically located where one network is joined to another network.

true

Routers are used on business and home networks to allow computers on the network to communicate.

true

Routers on the Internet use the information in the packet header to direct the packet to its destination.

true

Server computers run 24 hours a day, seven days a week to provide Internet services such as webpages and email.

true

Shared virtual reality provides immersive virtual environments over a network to be shared by participants in different locales.

true

Telecommunications networks play a vital role in our daily activities.

true

Telecommunications technologies produced the Internet and the many ways of accessing it.

true

The Internet is based on client/server relationships.

true

The Internet is the most obvious global network; but as an increasing number of businesses enter global markets, private global networks are becoming more prevalent.

true

The binary number system is used to represent values in computer systems.

true

The cables, switching stations, communication towers, and satellites that make up these networks are the hardware over which Internet traffic flows.

true

The world depends on the Internet to support financial transactions, communications, and information sharing.

true

Today, roughly a third of the world's population has Internet access.

true

Web 1.0 was the "one-way" web, with information traveling in one direction from servers to consumers.

true

A virtual private network (VPN) uses a technique called _____ to securely send private network data over the Internet.

tunnling

When a system combines voice, video, and data communications into one interface, it is referred to as ____ communications.

unified

A _______ connects LANs and MANs between cities, across countries, and around the world, using microwave and satellite transmission or telephone lines.

wan

Recently, the Internet backbone has become the target of cyberemployees.

false

TCP defines the format and addressing scheme used for the packets that travel across the Internet.

false

The Internet is a global, private network of computer networks.

false

The process of digitizing sound produces an exact copy of the original sound wave in digital form.

false

A PAN typically covers a range of around 33 ____.

feet

Smart phones are expected to make up ______ of all mobile phones by 2017, gradually squeezing plain cell phones out of the market. In developing countries, more people access the Internet via their mobile phones than via computers.

2/3

The current ____ IP address system can support about 4.3 billion addresses.

32 bit

The Internet backbone consists of mostly _______ that span(s) the globe, over land and under sea.

fiber-optic cab les

A _________ is a privately owned computer network that connects computers and devices within the same building or local geographic area.

LAN

P2P networks are used primarily for ____.

file sharing and distribution

A network ____ is responsible for setting up and maintaining the network.

administrator

Web 2.0 was inspired by the growing popularity of _____.

blogs

A web browser such as Internet Explorer is a _____ that requests a webpage from a web server, such as www.monster.com.

client

An email program, such as Outlook, acts as a ____ that connects to an email server to retrieve email messages.

client

Voice over IP refers to technologies that support voice communications using the Internet Protocol over ____ networks.

data

Because people are more comfortable dealing with names than numbers, IP addresses are assigned associated names called ____ names.

domain

The ____ Name System maintains a database of all IP addresses used on the Internet and acts like a phonebook, supplying information to Internet nodes and routers working to get data packets to their destination.

domain

_____ uses network systems and follows standards and procedures that enable output from one system to be processed directly as input to other systems, without human participation.

edi

A server receives webpage requests on port 53 and Domain-Name-System requests on port 80.

false

BitTorrent decreases the amount of Internet traffic.

false

Client/server is a network architecture in which one computer or program (the server) makes a service request from another computer or program (the client) that provides the service.

false

Devices attached to a network are called ports.

false

Fifteen root DNS servers, which are mirrored and duplicated around the world, make up the foundation of the DNS.

false

Home users are paying more money for VoIP by connecting to phone services provided over high-speed Internet connections.

false

If a portion of the Internet is disabled, packets get backed up and cannot find an alternative route to their destination.

false

Internet service providers cannot block users who download movies from illegal sources.

false

Internet2 is a brand-new Internet created by a group focused on developing the Internet from the ground up.

false

It is generally agreed that Web 2.0 was fueled by ecommerce sites seeking to solidify one-way communication.

false

LANs are often used in business systems to connect multiple businesses in a supply chain.

false

LANs can also be used to allow employees to access the corporate intranet from home and while on the road.

false

Phone-line networking, also called Home PLC, links computers through a home's phone wires.

false


Set pelajaran terkait

Chapter 11 - Global and International Issues

View Set

Supply Chain Ch. 13 Supply Chain Process Integration

View Set

PHYSICS Test #5: Chapters 28, 29, 38, 39, 43

View Set

Property and Casualty/Liability Insurance Basics

View Set

int busa 6.0 (organizations, cultures and diversity)

View Set

Chapter 7: Organization Change and Innovation

View Set