The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n) |
B) switch. |
The Internet is based on which three key technologies? |
C) client/server computing, packet switching, and the development of communications standards for linking networks and computers |
The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called |
B) packet switching. |
The telephone system is an example of a ________ network. A) peer-to-peer |
D) circuit-switched |
Which of the following is not a characteristic of packet switching? A) Packets travel independently of each other. |
C) Packet switching requires point-to-point circuits. |
In TCP/IP, IP is responsible for |
A) disassembling and reassembling of packets during transmission |
In a telecommunications network architecture, a protocol is |
B) a standard set of rules and procedures for control of communications in a network. C |
What are the four layers of the TCP/IP reference model? A) physical, application, transport, and network interface |
C) application, transport, Internet, and network interface |
Which signal types are represented by a continuous waveform? A) laser |
D) analog |
To use the analog telephone system for sending digital data, you must also use A) a modem. |
A) a modem. |
Which type of network is used to connect digital devices within a half-mile or 500-meter radius? |
B) LAN |
Which type of network treats all processors equally, and allows peripheral devices to be shared without going to a separate server? |
A) peer-to-peer |
Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents? |
C) Peer-to-peer network |
WSNs are designed for |
B) monitoring the physical environment. |
All of the following are physical components of an RFID system except A) bar code. |
A) bar code. |
Which digital cellular standard is used widely throughout the world except the United States? A) GSM |
A) GSM |
A network that spans a city, and sometimes its major suburbs as well, is called a A) CAN. |
B) MAN. |
A network that covers entire geographical regions is most commonly referred to as a(n) A) local area network. |
D) wide area network |
The concept of a future Web in which it is commonplace for everyday objects to be connected, controlled or monitored over the Internet is called |
A) the Web of things. |
Bandwidth is the |
C) difference between the highest and lowest frequencies that can be accommodated on a single channel. |
The total amount of digital information that can be transmitted through any telecommunications medium is measured in |
A) bps. |
Digital subscriber lines |
A) operate over existing telephone lines to carry voice, data, and video. |
T1 lines |
C) are high-speed, leased data lines providing guaranteed service levels. |
Which protocol is the Internet based on? A) TCP/IP |
A) TCP/IP |
What service converts IP addresses into more recognizable alphanumeric names? A) HTML |
B) DNS |
The child domain of the root is the A) top-level domain. |
A) top-level domain. |
In the domain name "http://books.azimuth-interactive.com", which element is the second- level domain? |
B) azimuth-interactive |
Which organization helps define the overall structure of the Internet? A) none (no one "owns" the Internet) |
D) IAB |
IPv6 is being developed in order to |
B) create more IP addresses. |
Which of the following services enables logging on to one computer system and working on another? |
D) telnet |
Instant messaging is a type of ________ service. A) chat |
a |
Which of the following statements about RFID is not true? A) RFIDs transmit only over a short range. |
D) RFIDs require line-of-sight contact to be read. |
_______ integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience. |
D) Unified communications |
A VPN |
A) is an encrypted private network configured within a public network. |
Web browser software requests Web pages from the Internet using which protocol? A) URL |
B) HTTP |
Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n) |
A) uniform resource locator. |
The most common Web server today, controlling 59 percent of the market, is A) Microsoft IIS. |
C) Apache HTTP Server. |
What technology allows people to have content pulled from Web sites and fed automatically to their computers? |
B) RSS |
The process of employing techniques to help a Web site achieve a higher ranking with the major search engines is called |
D) SEO |
Which of the following statements is not true about search engines? |
D) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged |
Which of the following is the first generation of cellular systems suitable for watching videos? |
D) 4G |
4G networks are also known as ________ networks. A) GSM |
C) LTD |
The most appropriate wireless networking standard for creating PANs is A) I-mode. |
D) Bluetooth. |
Bluetooth can be used to link up to ________ devices within a 10-meter area using low- power, radio-based communication. |
C) eight |
Which process is used to protect transmitted data in a VPN? A) tunneling |
A) tunneling |
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as |
B) hotspots. |
The 802.11 set of standards is known as A) WLAN. |
C) Wi-Fi. |
The WiMax standard can transmit up to a distance of approximately A) 30 meters. |
C) 30 miles. |
Passive RFID tags |
B) have a range of several feet. |
Based on your reading of the examples in the chapter, what would be the best use of RFID for a business? |
B) managing the supply chain |
MIS CH 7
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price