IS 3003 Chapter 7 Review

Ace your homework & exams now with Quizwiz!

Which of the following is an example of the "visual Web"? A) Twitter B) Blogger C) Pinterest D) Facebook

C. Pinterest

T lines: A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are high-speed, leased data lines providing guaranteed service levels. D) have up to twenty-four 64-Kbps channels.

C. are high-speed, leased data lines providing guaranteed service levels.

A router is a device that forwards packets of data through different networks, ensuring that the data gets to the right address

TRUE

Coaxial cable is similar to that used for cable television and consists of thickly insulted copper wire

TRUE

Fiber-optic cable is more expensive and harder to install than wire media

TRUE

In a client/server network, a network server provides every connected client with an address so it can be found by others on the network

TRUE

In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks

TRUE

In blogging, a trackback is a list of entries in other blogs that refer to a post in the first blog

TRUE

Increasingly, voice, video, and data communications are all based on Internet technology

TRUE

Instant messaging is a type of ________ service. A) chat B) cellular C) e-mail D) wireless

A. Chat

Which type of network serves a small group of computers, allowing them to share resources and peripherals without using a dedicated server? A) Peer-to-peer B) Wireless C) LAN D) Ring

A. Peer-to-peer

Which protocol is the Internet based on? A) TCP/IP B) FTP C) packet-switching D) HTTP

A. TCP/IP

The child domain of the root is the: A) top-level domain. B) second-level domain. C) host name. D) domain extension.

A. Top-level domain

Which process is used to protect transmitted data in a VPN? A) Tunneling B) PPP C) VOIP D) Packet switching

A. Tunneling

What service converts IP addresses into more recognizable alphanumeric names? A) HTML B) DNS C) IP D) HTTP

B. DNS

The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called: A) multiplexing. B) packet switching. C) packet routing. D) ATM.

B. Packet switching

What technology allows people to have content pulled from Web sites and fed automatically to their computers? A) FTP B) RSS C) HTTP D) Bluetooth

B. RSS

Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication. A) four B) six C) eight D) ten

C. Eight

Which of the following is a challenge posed by Wi-Fi networks? A) Lack of broadband support B) Connectivity issues with wired LANs C) Susceptibility to interference from nearby wireless systems D) High cost of infrastructure technology

C. Susceptibility to interference from nearby wireless systems

The most appropriate wireless networking standard for creating PANs is: A) I-mode. B) IEEE 802.11b. C) WiFi. D) Bluetooth.

D. Bluetooth

The telephone system is an example of a ________ network. A) peer-to-peer B) wireless C) packet-switched D) circuit-switched

D. Circuit-switched

A ________ is special software that routes and manages communications on the network and coordinates networks resources. A) switch B) firewall C) server D) network operating system/NOS

D. Network operating system/NOS

Which of the following is considered by many to be the defining Web 2.0 application? A) Instant messaging B) E-mail C) Blogging D) Social networking

D. Social networking

Which of the following statements is not true about search engines? A) They are arguably the Internet's "killer app." B) They have solved the problem of how users instantly find information on the Internet. C) They are monetized almost exclusively by search engine marketing. D) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

D. There are hundreds of search engines vying for user attention, with no clear leader having yet emerged

The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes

FALSE

To create a computer network, you must have at least two computers

TRUE

To use the analog telephone system for sending digital data, you must also use: A) a modem. B) a router. C) DSL. D) twisted wire.

A. A modem

In TCP/IP, IP is responsible for: A) disassembling and reassembling of packets during transmission. B) establishing an Internet connection between two computers. C) moving packets over the network. D) sequencing the transfer of packets

A. Disassembling and reassembling of packets during transmission

In Europe, and much of the world, the standard for cellular services is: A) GSM. B) LTE. C) Wi-Max. D) CDMA.

A. GSM

A VPN: A) is an encrypted private network configured within a public network. B) is more expensive than a dedicated network. C) provides secure, encrypted communications using Telnet. D) is an Internet-based service for delivering voice communications.

A. Is an encrypted private network configured within a public network

Digital subscriber lines: A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are very-high-speed data lines typically leased from long-distance telephone companies. D) have up to twenty-four 64-Kbps channels.

A. Operate over existing telephone lines to carry voice, data, and video.

Prior to the development of ________, computer networks used leased, dedicated telephone circuits to communicate with other computers in remote locations. A) packet switching B) routers C) servers D) coaxial cable

A. Packet switching

Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): A) uniform resource locator. B) IP address. C) third level domain. D) root domain.

A. Uniform resource locator

Which of the following enables multiple users to create and edit Web documents? A) Wiki B) Blog C) Social networking D) Pinterest

A. Wiki

The total amount of digital information that can be transmitted through any telecommunications medium is measured in: A) bps. B) Hertz. C) baud. D) gigaflops.

A. bps

What is the primary difference between 3G and 4G cellular systems? A) 4G systems are digital. B) 4G systems have greater transmission speeds. C) 3G systems are unable to handle Web browsing. D) 3G systems have poor security.

B. 4G systems have greater transmission speeds

In a telecommunications network architecture, a protocol is: A) a device that handles the switching of voice and data in a local area network. B) a standard set of rules and procedures for control of communications in a network. C) a communications service for microcomputer users. D) the main computer in a telecommunications network

B. A standard set of rules and procedures for control of communications in a network.

A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub. A) hot spot B) access point C) server D) wireless router

B. Access Point

IPv6 is being developed in order to: A) update the packet transmission protocols for higher bandwidth. B) create more IP addresses. C) allow for different levels of service. D) support Internet2.

B. Create more IP addresses

Web browser software requests Web pages from the Internet using which protocol? A) URL B) HTTP C) DNS D) HTML

B. HTTP

One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as: A) touch points. B) hotspots. C) hot points. D) wireless hubs.

B. Hotspots

Which type of network is used to connect digital devices within a half-mile or 500-meter radius? A) Microwave B) LAN C) WAN D) MAN

B. LAN

A network that spans a city, and sometimes its major suburbs as well, is called a: A) CAN. B) MAN. C) LAN. D) WAN.

B. MAN

Based on your reading of the examples in the chapter, what would be the best use of RFID for a business? A) Logging transactions B) Managing the supply chain C) Lowering network costs D) Enabling client communication

B. Managing the supply chain

The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n): A) hub. B) switch. C) router. D) NIC.

B. Switch

In the domain name "http://myspace.blogging.com", what are the root, top-level, second-level, and third-level domains, respectively? A) "http://", myspace, blogging, com B) "http://", com, blogging, myspace C) ".", com, blogging, myspace D) ".", myspace, blogging, com

C. ".", com, blogging, myspace

The WiMax standard can transmit up to a distance of approximately: A) 30 meters. B) 500 meters. C) 30 miles. D) 5 miles.

C. 30 miles

The "Internet of Things" refers to: A) the increasing focus on shopping as the major user activity on the Internet. B) the microblogging trend, in which users exchange short text and pictures rather than longer and more in-depth content and text. C) a vision of a pervasive Web, in which common objects are connected to and controlled over the Internet. D) the trend away from platform-independent Web applications to mobile-device specific apps.

C. A vision of a pervasive Web, in which common objects are connected to and controlled over the Internet

A LAN would be used to connect all of the following except: A) all of the computers in a large building. B) all of the devices within a 10-meter area. C) all of the computers in a city. D) all of the computers in a small office.

C. All of the computers in a city

The most common Web server today, controlling 65 percent of the market, is: A) Microsoft IIS. B) WebSTAR. C) Apache HTTP Server. D) Netscape Server.

C. Apache HTTP Server

What are the four layers of the TCP/IP reference model? A) Physical, application, transport, and network interface B) Physical, application, Internet, and network interface C) Application, transport, Internet, and network interface D) Application, hardware, Internet, and network interface

C. Application, transport, Internet, and network interface

The Internet is based on which three key technologies? A) TCP/IP, HTML, and HTTP B) TCP/IP, HTTP, and packet switching C) Client/server computing, packet switching, and the development of communications standards for linking networks and computers D) Client/server computing, packet switching, and HTTP

C. Client/server computing, packet switching, and the development of communications standards for linking networks and computers

Bandwidth is the: A) number of frequencies that can be broadcast through a medium. B) number of cycles per second that can be sent through a medium. C) difference between the highest and lowest frequencies that can be accommodated on a single channel. D) total number of bytes that can be sent through a medium per second.

C. Difference between the highest and lowest frequencies that can be accommodated on a single channel.

Which of the following is not a characteristic of packet switching? A) Packets travel independently of each other. B) Packets are routed through many different paths. C) Packet switching requires point-to-point circuits. D) Packets include data for checking transmission errors

C. Packet switching requires point-to-point circuits

Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents? A) PAN B) Domain-based LAN C) Peer-to-peer network D) Campus area network

C. Peer-to-peer network

Which of the following services enables logging on to one computer system and working on another? A) FTP B) LISTSERV C) Telnet D) World Wide Web

C. Telnet

The 802.11 set of standards is known as: A) WLAN. B) WSN. C) Wi-Fi. D) WiMax.

C. Wi-Fi

Which signal types are represented by a continuous waveform? A) Laser B) Optical C) Digital D) Analog

D. Analog

Which organization helps define the overall structure of the Internet? A) None (no one "owns" the Internet) B) W3C C) ICANN D) IAB

D. IAB

Which of the following statements about RFID is not true? A) RFIDs transmit only over a short range. B) RFIDs use an antenna to transmit data. C) Microchips embedded in RFIDs are used to store data. D) RFIDs require line-of-sight contact to be read.

D. RFIDs require line-of-sight contact to be read

The process of employing techniques to help a Web site achieve a higher ranking with the major search engines is called: A) VPN. B) IAB. C) SEM. D) SEO.

D. SEO

________ integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience. A) Wireless networks B) Intranets C) Virtual private networks D) Unified communications

D. Unified communications

A network that covers entire geographical regions is most commonly referred to as a(n): A) local area network. B) intranet. C) peer-to-peer network. D) wide area network.

D. Wide area network

A Web server is a dedicated computer that delivers Web pages to client computers

FALSE

A hub is a networking device that connects network components and is used to filter and forward data to specified destinations on the network

FALSE

An ISP is a commercial organization that owns a region of transcontinental high-speed backbone networks carrying the bulk of Internet traffic

FALSE

An NOS must reside on a dedicated server computer in order to manage a network

FALSE

An analog signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits

FALSE

Central large mainframe computing has largely replaced client/server computing

FALSE

Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching

FALSE

Mobile search makes up approximately 10% of all internet searches

FALSE

RFID technology is being gradually replaced by less costly technologies such as WSNs

FALSE

TCP/IP was developed in the 1960s to enable university scientists to transmit data from computer to computer

FALSE

Telephone networks are fundamentally different from computer networks

TRUE

The Domain Name System (DNS) converts domain names to IP addresses

TRUE

The trunk lines of the Internet are typically owned by network service providers

TRUE

Today, most Americans connect to the Internet through broadband connections at speeds up to 15 Mbps

TRUE

Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms

TRUE

VoIP technology delivers voice information in digital form using packet switching

TRUE

Web 3.0 is a collaborative effort to add a layer of meaning to the existing Web in order to reduce the amount of human involvement in searching for and processing Web information

TRUE


Related study sets

Test 3 - Performance Management (11)

View Set

Final Study Review Questions (From My Evolve- Merrill's Chapter Questions)

View Set

Lit Quiz Study Guide 2 (Fall OAT)

View Set

WCU patho midterm select all questions

View Set

CISM (Domain 4) 30% Incident Management

View Set

ПЕРЕКЛАД У СФЕРІ ДІЛОВОГО СПІЛКУВАННЯ

View Set

Chapter 12: Activity-Based Management

View Set

Chapter 5 Externalities, Environmental Policy, and Public Goods

View Set