The Ironman Triathlon World Championship now uses WiMAX technology, which includes cameras strategically placed along the course for spectators, fans, and family to watch the athlete’s performance |
TRUe |
A local area network (LAN) spans a large geographic area such as a state, province, or country |
FALSE |
Network convergence is the integration of communication channels into a single service |
FALSE |
A domain name system (DNS) converts IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions |
TRUe |
An intranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, Web publishing, and the support of business processes |
TRUE |
VPNs are often used to connect to a corporate server, stands for Value PN |
FALSE |
The three main benefits of networks or a connected world include sharing resources, providing opportunities, and reducing travel |
TRUE |
The main challenges facing networks include security, social, ethical and political issues |
TRUE |
Two methods for encrypting network traffic on the Web are secure sockets layer and secure hypertext transfer protocol |
TRUE |
Secure sockets layer (SSL) is a combination of HTTP and SSL to provide encryption and secure identification of an Internet server |
FALSE |
Mobile and wireless networks are identical and the terms can be used synonymously |
FALSE |
Wireless networking includes personal area networks (PAN) that provide communication over a short distance that is intended for use with devices that are owned and operated by a single user |
TRUE |
A wireless LAN (WLAN) is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves |
FALSE |
Worldwide Interoperability for Microwave Access (WiMAX) is a communications technology aimed at providing high-speed wireless data over metropolitan area networks |
TRUE |
Radio-frequency identification (RFID) uses electronic tags and labels to identify objects wirelessly over short distances |
TRUE |
RFID innovations and technologies are being used in many industries including retail, hospitals, pharmaceuticals, and ranchers |
TRUE |
A global positioning system (GPS) consists of hardware, software, and data that provide location information for display on a multidimensional map |
FALSE |
A great GIS example, Google earth, combines satellite imagery, geographic data, and Google’s search capabilities to create a virtual globe that users can download to a computer or mobile device |
TRUE |
GPS utilizes location-based services (LBS), applications that use location information to provide a service, whereas a GIS does not use LBS applications |
FALSE |
Wireless networks offer many business advantages but can often slow employee productivity and workflow processes |
FALSE |
Enhancing mobility is one of the greatest advantages provided by wireless networks It allows activities that were formerly tied to physical locations to be performed almost anywhere. |
TRUE |
Instant access to customer profiles, account history, and current order status significantly improves the quality of interactions with customers, suppliers, and business partners |
TRUE |
Wireless technology offers the opportunity to redesign and often complicates the work flow processes to be faster, yet more expensive, and more time-consuming |
FALSE |
One of the main challenges of business mobility is protecting against theft |
TRUE |
WLANs that use Wi-Fi have a built-in security mechanism called Wi-Fi protected access (WPA), a wireless security protocol to protect Wi-Fi networks |
TRUE |
LBS differ from RFID in that an LBS cannot track and monitor objects such as inventory |
FALSe |
With the power of a wireless network, business professionals can take advantage of mobility allowing them to work from anywhere, at any time, using many different devices |
TRUE |
Some of the social challenges with networking occur with newsgroups or blogs where like-minded people can exchange messages. Problems can arise when sensitive social issues become the topic of discussion such as politics or religion. |
TRUE |
29. Which athletic event now has the athletes wear radio-frequency identification ankle bracelets to track the athlete’s progress with high-bandwidth communication to transfer the information to the Internet |
B. The Ironman Triathlon |
30. What enables telecommunications or the exchange of information (voice, text, data, audio, and video) |
A. Computer networks |
31. What services do telecommunications offer |
D. All of the above |
Which of the following includes the three primary network types |
B. LAN, WAN, MAN |
33. What is a large computer network usually spanning a city or a specific infrastructure like a college known as |
A. Metropolitan area network (MAN) |
34. What spans a large geographic area such as a state, province, or country, similar to the Internet |
C. Wide area network (WAN) |
35. What connects a group of computers in close proximity, such as in a school or office setting |
B. Local area network (LAN) |
36. What are the five elements that are needed to create a connected world or a network |
C. Categories, providers, access technologies, protocols, and convergence |
38. What is the largest and most important network that has evolved into a global information superhighway |
D. All of the above |
40. Which of the below offers an example of a WAN |
D. All of the above |
41. Which of the below is not a LAN |
D. The Internet |
42. The Internet is a hierarchical structure linking different levels of service providers whose millions of devices supply all the interconnections. The three levels outlined in the book from the top down include ____________________. |
B. National service provider (NSP), Regional service provider (RSP), and Internet service provider (ISP) |
43. NSPs are private companies that own and maintain the worldwide backbone that supports the Internet. Which of the below is not an NSP |
C. Microsoft |
44. Which of the below is not a major ISP in the United States |
D. Apple |
45. What measures network performance by the maximum amount of data that can pass from one point to another in a unit of time |
A. Bandwidth |
46. The speed of transmission of a network is determined by the speed of its smallest _____________. |
C. Amount of bandwidth |
47. What is a device that enables a computer to transmit and receive data |
B. Modem |
48. Which of the following terms refers to the smallest element of data and has a value of either 0 or 1 |
A. Bit |
49. What measures bandwidth in terms of numbers transferred or received per unit of time |
D. Bit rate |
50. What is a high-speed Internet connection that is always connected and has a bandwidth greater than 2 Mbps |
C. Broadband |
51. What are the two most prevalent types of broadband access |
B. Digital subscriber line and cable connection |
52. Which of the following allows high-speed digital data transmission over standard telephone lines |
A. Digital subscriber line (DSL) |
53. Which of the following provides Internet access using a cable television company’s infrastructure and a special cable modem |
B. Internet cable connection |
54. Which of the below allows a user to access the Internet |
D. All of the above |
55. Which of the following is a type of data connection able to transmit a digital signal at 1.544 Mpbs and is more expensive and reliable than cable or DSL |
A. T1 line |
56. What is the standard that specifies the format of data as well as the rules to be followed during transmission |
C. Protocol |
57. What is the standard Internet protocol, which provides the technical foundation for the public Internet |
B. Transmission control protocol/Internet protocol (TCP/IP) |
58. How do TCP and IP differ |
A. TCP verifies the correct delivery of data in case it is corrupted, where IP verifies the data are sent to the correct IP address |
60. Which domain is reserved for U.S. government agencies |
C. .gov |
61. Which domain is the most common and reserved for commercial organizations and businesses |
B. .com |
62. Which domain is reserved for accredited postsecondary institutions |
B. .edu |
63. Which domain is reserved for the U.S. military |
A. .mil |
64. What is the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures |
C. Network convergence |
65. What is a benefit of network convergence |
D. All of the above |
66. What is the integration of communication channels into a single service |
B. Unified communication |
67. What is VoIP |
D. VoIP offers all of the above |
68. What is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server |
A. Peer-to-peer (P2P) |
69. Which of the below is an example of P2P |
B. Skype |
70. Which statement below is inaccurate in reference to domain names |
B. Domain names are owned |
71. What can unified communications merge |
D. All of the above |
72. Which of the below statements is inaccurate in reference to unified communications |
D. UC increases communication expenses |
73. VoIP allows users to _____________. |
D. All of the above |
74. What is a benefit of VoIP |
A. Lowers costs |
75. What distributes digital video content using IP across the Internet and private IP networks |
B. Internet protocol TV (IPTV) |
76. What is a feature of IPTV |
D. All of the above |
77. What is a disadvantage of networking or performing business in a connected world |
D. Increases resource threats |
78. Which benefits of a connected world makes all applications, equipment (such as a high-volume printer), and data available to anyone on the network, without regard to the physical location of the resource or the user |
A. Sharing resources |
79. What is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, and web publishing |
C. Intranet |
80. What is an extension of an Intranet that is available only to authorized outsiders |
D. Extranet |
81. An extranet is not available for use by a ______________. |
D. Competitor |
82. What is a VPN |
B. A direct private network that creates a "private tunnel" within the Internet to connect to the corporate server |
83. Why would a company use an Intranet |
D. All of the above |
84. What is the major challenge of networking or performing business in a connected world |
C. Security issues |
85. What are the two main methods for encrypting network traffic on the Web |
B. SSL and SHTTP |
86. What is a combination of HTTP and SSL that provides encryption and secure identification of an Internet server |
A. Secure hypertext transfer protocol (SHTTP) |
87. To create an SSL connection, a Web server requires a _____________, which is an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company. |
C. SSL Certificate |
88. What is the digital divide |
A. A worldwide gap giving advantage to those with access to technology |
89. What is the worldwide gap giving advantage to those with access to technology |
B. Digital divide |
90. What are the four wireless communication network categories |
D. Personal area networks, wireless local area networks, wireless metropolitan area networks, and wireless wide area networks |
92. Which of the below statements is not accurate in reference to mobile and wireless computing |
C. Wireless technology is any type of operation accomplished with the use of a hard-wired connection |
94. What is a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices |
C. Bluetooth |
95. Which network uses radio signals to transmit and receive data over distances of a few hundred feet |
D. WLAN |
96. What is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves |
B. Wireless fidelity (WI-FI) |
97. What are areas around access points where users can connect to the Internet via WI-FI |
A. Hotspots |
98. The bandwidths associated with Wi-Fi are separated according to several wireless networking standards, known as __________, for carrying out wireless local area network communication. |
B. 802.11 |
99. A wireless MAN (WMAN) is a metropolitan area network that uses ___________ to transmit and receive data. |
D. Radio signals |
100. What does the wireless technology WiMAX stand for |
A. Worldwide Interoperability for Microwave Access |
101. A wireless WAN (WWAN) is a wide area network that uses radio signals to transmit and receive data and can be divided into which two categories |
C. Cellular and satellite communication systems |
102. Cell phones have morphed into _________ __________ that offer more advanced computing ability and connectivity than basic cell phones. |
B. Smart phones |
103. What is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred |
A. Streaming |
104. What is a space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area |
B. Satellite |
105. What are satellite communications used for |
D. All of the above |
106. Which of the below is experiencing rapid growth due to wireless technology |
D. All of the above |
107. Which business application uses electronic tags and labels to identify objects wirelessly over short distances |
A. Radio-frequency identification |
108. Which business application uses location information to provide a service and is designed to give mobile users instant access to personalized local content |
D. Location-based services |
109. Which business application is a satellite-based navigation system providing extremely accurate position, time, and speed information |
B. Global positioning systems |
110. Which business application consists of hardware, software, and data that provide location information for display on a multidimensional map |
C. Geographic information systems |
111. Which of the following is not a primary use of GIS |
D. Ensuring safety equipment is on an airplane before a flight. |
112. Which of the below uses both GIS and GPS |
All of the above |
114. ________ is a security protocol that protects Wi-Fi networks. |
B. Wi-Fi protected access |
115. The potential for contracting viruses on mobile devices is increasing; in fact, the first known mobile phone virus was called _____________. |
A. Cabir |
116. Which of the following is a measure being considered to address privacy concerns with RFIDs and LBSs |
D. All of the above |
37. LANs, WANs, and MANs all provide users with an accessible and reliable network infrastructure. Which of the below are the most important network differentiating dimensions? |
D. Cost and performance |
113. Which social media site uses LBS? |
A. Foursquare |
93. What is a wireless network that provides communication over a short distance that is intended for use with devices that are owned and operated by a single user? |
C. Personal area network |
91. Which of the following is not a type of wireless network? |
D. MAN |
59. What is the conversion of IP addresses that identifies labels that use a variety of recognizable naming conventions? |
D. Domain name system (DNS) |
BIS Chap 7
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price