BIS Chap 7

Your page rank:

Total word count: 2345
Pages: 9

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

The Ironman Triathlon World Championship now uses WiMAX technology, which includes cameras strategically placed along the course for spectators, fans, and family to watch the athlete’s performance

TRUe

A local area network (LAN) spans a large geographic area such as a state, province, or country

FALSE

Network convergence is the integration of communication channels into a single service

FALSE

A domain name system (DNS) converts IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions

TRUe

An intranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, Web publishing, and the support of business processes

TRUE

VPNs are often used to connect to a corporate server, stands for Value PN

FALSE

The three main benefits of networks or a connected world include sharing resources, providing opportunities, and reducing travel

TRUE

The main challenges facing networks include security, social, ethical and political issues

TRUE

Two methods for encrypting network traffic on the Web are secure sockets layer and secure hypertext transfer protocol

TRUE

Secure sockets layer (SSL) is a combination of HTTP and SSL to provide encryption and secure identification of an Internet server

FALSE

Mobile and wireless networks are identical and the terms can be used synonymously

FALSE

Wireless networking includes personal area networks (PAN) that provide communication over a short distance that is intended for use with devices that are owned and operated by a single user

TRUE

A wireless LAN (WLAN) is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves

FALSE

Worldwide Interoperability for Microwave Access (WiMAX) is a communications technology aimed at providing high-speed wireless data over metropolitan area networks

TRUE

Radio-frequency identification (RFID) uses electronic tags and labels to identify objects wirelessly over short distances

TRUE

RFID innovations and technologies are being used in many industries including retail, hospitals, pharmaceuticals, and ranchers

TRUE

A global positioning system (GPS) consists of hardware, software, and data that provide location information for display on a multidimensional map

FALSE

A great GIS example, Google earth, combines satellite imagery, geographic data, and Google’s search capabilities to create a virtual globe that users can download to a computer or mobile device

TRUE

GPS utilizes location-based services (LBS), applications that use location information to provide a service, whereas a GIS does not use LBS applications

FALSE

Wireless networks offer many business advantages but can often slow employee productivity and workflow processes

FALSE

Enhancing mobility is one of the greatest advantages provided by wireless networks It allows activities that were formerly tied to physical locations to be performed almost anywhere.

TRUE

Instant access to customer profiles, account history, and current order status significantly improves the quality of interactions with customers, suppliers, and business partners

TRUE

Wireless technology offers the opportunity to redesign and often complicates the work flow processes to be faster, yet more expensive, and more time-consuming

FALSE

One of the main challenges of business mobility is protecting against theft

TRUE

WLANs that use Wi-Fi have a built-in security mechanism called Wi-Fi protected access (WPA), a wireless security protocol to protect Wi-Fi networks

TRUE

LBS differ from RFID in that an LBS cannot track and monitor objects such as inventory

FALSe

With the power of a wireless network, business professionals can take advantage of mobility allowing them to work from anywhere, at any time, using many different devices

TRUE

Some of the social challenges with networking occur with newsgroups or blogs where like-minded people can exchange messages. Problems can arise when sensitive social issues become the topic of discussion such as politics or religion.

TRUE

29. Which athletic event now has the athletes wear radio-frequency identification ankle bracelets to track the athlete’s progress with high-bandwidth communication to transfer the information to the Internet

B. The Ironman Triathlon

30. What enables telecommunications or the exchange of information (voice, text, data, audio, and video)

A. Computer networks

31. What services do telecommunications offer

D. All of the above

Which of the following includes the three primary network types

B. LAN, WAN, MAN

33. What is a large computer network usually spanning a city or a specific infrastructure like a college known as

A. Metropolitan area network (MAN)

34. What spans a large geographic area such as a state, province, or country, similar to the Internet

C. Wide area network (WAN)

35. What connects a group of computers in close proximity, such as in a school or office setting

B. Local area network (LAN)

36. What are the five elements that are needed to create a connected world or a network

C. Categories, providers, access technologies, protocols, and convergence

38. What is the largest and most important network that has evolved into a global information superhighway

D. All of the above

40. Which of the below offers an example of a WAN

D. All of the above

41. Which of the below is not a LAN

D. The Internet

42. The Internet is a hierarchical structure linking different levels of service providers whose millions of devices supply all the interconnections. The three levels outlined in the book from the top down include ____________________.

B. National service provider (NSP), Regional service provider (RSP), and Internet service provider (ISP)

43. NSPs are private companies that own and maintain the worldwide backbone that supports the Internet. Which of the below is not an NSP

C. Microsoft

44. Which of the below is not a major ISP in the United States

D. Apple

45. What measures network performance by the maximum amount of data that can pass from one point to another in a unit of time

A. Bandwidth

46. The speed of transmission of a network is determined by the speed of its smallest _____________.

C. Amount of bandwidth

47. What is a device that enables a computer to transmit and receive data

B. Modem

48. Which of the following terms refers to the smallest element of data and has a value of either 0 or 1

A. Bit

49. What measures bandwidth in terms of numbers transferred or received per unit of time

D. Bit rate

50. What is a high-speed Internet connection that is always connected and has a bandwidth greater than 2 Mbps

C. Broadband

51. What are the two most prevalent types of broadband access

B. Digital subscriber line and cable connection

52. Which of the following allows high-speed digital data transmission over standard telephone lines

A. Digital subscriber line (DSL)

53. Which of the following provides Internet access using a cable television company’s infrastructure and a special cable modem

B. Internet cable connection

54. Which of the below allows a user to access the Internet

D. All of the above

55. Which of the following is a type of data connection able to transmit a digital signal at 1.544 Mpbs and is more expensive and reliable than cable or DSL

A. T1 line

56. What is the standard that specifies the format of data as well as the rules to be followed during transmission

C. Protocol

57. What is the standard Internet protocol, which provides the technical foundation for the public Internet

B. Transmission control protocol/Internet protocol (TCP/IP)

58. How do TCP and IP differ

A. TCP verifies the correct delivery of data in case it is corrupted, where IP verifies the data are sent to the correct IP address

60. Which domain is reserved for U.S. government agencies

C. .gov

61. Which domain is the most common and reserved for commercial organizations and businesses

B. .com

62. Which domain is reserved for accredited postsecondary institutions

B. .edu

63. Which domain is reserved for the U.S. military

A. .mil

64. What is the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures

C. Network convergence

65. What is a benefit of network convergence

D. All of the above

66. What is the integration of communication channels into a single service

B. Unified communication

67. What is VoIP

D. VoIP offers all of the above

68. What is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server

A. Peer-to-peer (P2P)

69. Which of the below is an example of P2P

B. Skype

70. Which statement below is inaccurate in reference to domain names

B. Domain names are owned

71. What can unified communications merge

D. All of the above

72. Which of the below statements is inaccurate in reference to unified communications

D. UC increases communication expenses

73. VoIP allows users to _____________.

D. All of the above

74. What is a benefit of VoIP

A. Lowers costs

75. What distributes digital video content using IP across the Internet and private IP networks

B. Internet protocol TV (IPTV)

76. What is a feature of IPTV

D. All of the above

77. What is a disadvantage of networking or performing business in a connected world

D. Increases resource threats

78. Which benefits of a connected world makes all applications, equipment (such as a high-volume printer), and data available to anyone on the network, without regard to the physical location of the resource or the user

A. Sharing resources

79. What is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, and web publishing

C. Intranet

80. What is an extension of an Intranet that is available only to authorized outsiders

D. Extranet

81. An extranet is not available for use by a ______________.

D. Competitor

82. What is a VPN

B. A direct private network that creates a "private tunnel" within the Internet to connect to the corporate server

83. Why would a company use an Intranet

D. All of the above

84. What is the major challenge of networking or performing business in a connected world

C. Security issues

85. What are the two main methods for encrypting network traffic on the Web

B. SSL and SHTTP

86. What is a combination of HTTP and SSL that provides encryption and secure identification of an Internet server

A. Secure hypertext transfer protocol (SHTTP)

87. To create an SSL connection, a Web server requires a _____________, which is an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company.

C. SSL Certificate

88. What is the digital divide

A. A worldwide gap giving advantage to those with access to technology

89. What is the worldwide gap giving advantage to those with access to technology

B. Digital divide

90. What are the four wireless communication network categories

D. Personal area networks, wireless local area networks, wireless metropolitan area networks, and wireless wide area networks

92. Which of the below statements is not accurate in reference to mobile and wireless computing

C. Wireless technology is any type of operation accomplished with the use of a hard-wired connection

94. What is a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices

C. Bluetooth

95. Which network uses radio signals to transmit and receive data over distances of a few hundred feet

D. WLAN

96. What is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves

B. Wireless fidelity (WI-FI)

97. What are areas around access points where users can connect to the Internet via WI-FI

A. Hotspots

98. The bandwidths associated with Wi-Fi are separated according to several wireless networking standards, known as __________, for carrying out wireless local area network communication.

B. 802.11

99. A wireless MAN (WMAN) is a metropolitan area network that uses ___________ to transmit and receive data.

D. Radio signals

100. What does the wireless technology WiMAX stand for

A. Worldwide Interoperability for Microwave Access

101. A wireless WAN (WWAN) is a wide area network that uses radio signals to transmit and receive data and can be divided into which two categories

C. Cellular and satellite communication systems

102. Cell phones have morphed into _________ __________ that offer more advanced computing ability and connectivity than basic cell phones.

B. Smart phones

103. What is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred

A. Streaming

104. What is a space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area

B. Satellite

105. What are satellite communications used for

D. All of the above

106. Which of the below is experiencing rapid growth due to wireless technology

D. All of the above

107. Which business application uses electronic tags and labels to identify objects wirelessly over short distances

A. Radio-frequency identification

108. Which business application uses location information to provide a service and is designed to give mobile users instant access to personalized local content

D. Location-based services

109. Which business application is a satellite-based navigation system providing extremely accurate position, time, and speed information

B. Global positioning systems

110. Which business application consists of hardware, software, and data that provide location information for display on a multidimensional map

C. Geographic information systems

111. Which of the following is not a primary use of GIS

D. Ensuring safety equipment is on an airplane before a flight.

112. Which of the below uses both GIS and GPS

All of the above

114. ________ is a security protocol that protects Wi-Fi networks.

B. Wi-Fi protected access

115. The potential for contracting viruses on mobile devices is increasing; in fact, the first known mobile phone virus was called _____________.

A. Cabir

116. Which of the following is a measure being considered to address privacy concerns with RFIDs and LBSs

D. All of the above

37. LANs, WANs, and MANs all provide users with an accessible and reliable network infrastructure. Which of the below are the most important network differentiating dimensions?

D. Cost and performance

113. Which social media site uses LBS?

A. Foursquare

93. What is a wireless network that provides communication over a short distance that is intended for use with devices that are owned and operated by a single user?

C. Personal area network

91. Which of the following is not a type of wireless network?

D. MAN

59. What is the conversion of IP addresses that identifies labels that use a variety of recognizable naming conventions?

D. Domain name system (DNS)

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending