Mis Chapter 7 Analysis Test Questions
Unlock all answers in this set
Unlock answersquestion
The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n) A) hub. B) switch. C) router. D) NIC.
answer
B) switch.
question
The Internet is based on which three key technologies? A) TCP/IP, HTML, and HTTP B) TCP/IP, HTTP, and packet switching C) client/server computing, packet switching, and the development of communications standards for linking networks and computers D) client/server computing, packet switching, and HTTP
answer
C) client/server computing, packet switching, and the development of communications standards for linking networks and computers
question
The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called A) multiplexing. B) packet switching. C) packet routing. D) ATM.
answer
B) packet switching
question
The telephone system is an example of a ________ network. A) peer-to-peer B) wireless C) packet-switched D) circuit-switched
answer
D) circuit-switched
question
Which of the following is not a characteristic of packet switching? A) Packets travel independently of each other. B) Packets are routed through many different paths. C) Packet switching requires point-to-point circuits. D) Packets include data for checking transmission errors.
answer
C) Packet switching requires point-to-point circuits.
question
In TCP/IP, IP is responsible for A) disassembling and reassembling of packets during transmission. B) establishing an Internet connection between two computers. C) moving packets over the network. D) sequencing the transfer of packets.
answer
A) disassembling and reassembling of packets during transmission.
question
In a telecommunications network architecture, a protocol is A) a device that handles the switching of voice and data in a local area network. B) a standard set of rules and procedures for control of communications in a network. C) a communications service for microcomputer users. D) the main computer in a telecommunications network.
answer
B) a standard set of rules and procedures for control of communications in a network.
question
What are the four layers of the TCP/IP reference model? A) physical, application, transport, and network interface B) physical, application, Internet, and network interface C) application, transport, Internet, and network interface D) application, hardware, Internet, and network interface
answer
C) application, transport, Internet, and network interface
question
Which signal types are represented by a continuous waveform? A) laser B) optical C) digital D) analog
answer
D) analog
question
To use the analog telephone system for sending digital data, you must also use A) a modem. B) a router. C) DSL. D) twisted wire.
answer
A) a modem.
question
Which type of network is used to connect digital devices within a half-mile or 500-meter radius? A) Wi-Fi B) LAN C) WAN D) MAN
answer
B) LAN
question
Which type of network treats all processors equally, and allows peripheral devices to be shared without going to a separate server? A) peer-to-peer B) wireless C) LAN D) Windows domain network
answer
A) peer-to-peer
question
Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents? A) MAN B) Domain-based LAN C) Peer-to-peer network D) WAN
answer
C) Peer-to-peer network
question
WSNs are designed for A) connecting multiple wireless computing devices. B) monitoring the physical environment. C) increasing the reach of Wi-Fi networks. D) tracking the movement of goods in a supply chain.
answer
B) monitoring the physical environment.
question
All of the following are physical components of an RFID system except A) bar code. B) antenna. C) radio transmitters. D) tags.
answer
A) bar code.
question
Which digital cellular standard is used widely throughout the world except the United States? A) GSM B) CDMA C) WLAN D) LTD
answer
A) GSM
question
A network that spans a city, and sometimes its major suburbs as well, is called a A) CAN. B) MAN. C) LAN. D) WAN.
answer
B) MAN.
question
A network that covers entire geographical regions is most commonly referred to as a(n) A) local area network. B) intranet. C) peer-to-peer network. D) wide area network.
answer
D) wide area network.
question
The concept of a future Web in which it is commonplace for everyday objects to be connected, controlled or monitored over the Internet is called A) the Web of things. B) the Semantic Web. C) Internet2. D) a 3-D Web.
answer
A) the Web of things.
question
Bandwidth is the A) number of frequencies that can be broadcast through a medium. B) number of cycles per second that can be sent through a medium. C) difference between the highest and lowest frequencies that can be accommodated on a single channel. D) total number of bytes that can be sent through a medium per second
answer
C) difference between the highest and lowest frequencies that can be accommodated on a single channel.
question
The total amount of digital information that can be transmitted through any telecommunications medium is measured in A) bps. B) Hertz. C) baud. D) gigaflops.
answer
A) bps.
question
Digital subscriber lines A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are very-high-speed data lines typically leased from long-distance telephone companies. D) have up to twenty-four 64-Kbps channels.
answer
A) operate over existing telephone lines to carry voice, data, and video.
question
T1 lines A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are high-speed, leased data lines providing guaranteed service levels. D) have up to twenty-four 64-Kbps channels.
answer
C) are high-speed, leased data lines providing guaranteed service levels.
question
Which protocol is the Internet based on? A) TCP/IP B) FTP C) packet-switching D) HTTP
answer
A) TCP/IP
question
What service converts IP addresses into more recognizable alphanumeric names? A) HTML B) DNS C) IP D) HTTP
answer
B) DNS
question
The child domain of the root is the A) top-level domain. B) second-level domain. C) host name. D) domain extension.
answer
A) top-level domain.
question
In the domain name "http://books.azimuth-interactive.com", which element is the second-level domain? A) books B) azimuth-interactive C) com D) none; there is no second-level domain in this name
answer
B) azimuth-interactive
question
Which organization helps define the overall structure of the Internet? A) none (no one "owns" the Internet) B) W3C C) ICANN D) IAB
answer
D) IAB
question
IPv6 is being developed in order to A) update the packet transmission protocols for higher bandwidth. B) create more IP addresses. C) allow for different levels of service. D) support Internet2.
answer
B) create more IP addresses.
question
) Which of the following services enables logging on to one computer system and working on another? A) FTP B) World Wide Web C) newsgroups D) telnet
answer
D) telnet
question
Instant messaging is a type of ________ service. A) chat B) cellular C) e-mail D) wireless
answer
A) chat
question
Which of the following statements about RFID is not true? A) RFIDs transmit only over a short range. B) RFIDs use an antenna to transmit data. C) Microchips embedded in RFIDs are used to store data. D) RFIDs require line-of-sight contact to be read.
answer
D) RFIDs require line-of-sight contact to be read.
question
________ integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience. A) Wireless networks B) Intranets C) Virtual private networks D) Unified communications
answer
D) Unified communications
question
A VPN A) is an encrypted private network configured within a public network. B) is more expensive than a dedicated network. C) provides secure, encrypted communications using Telnet. D) is an Internet-based service for delivering voice communications.
answer
A) is an encrypted private network configured within a public network.
question
Web browser software requests Web pages from the Internet using which protocol? A) URL B) HTTP C) DNS D) HTML
answer
B) HTTP
question
Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n) A) uniform resource locator. B) IP address. C) third-level domain. D) root domain.
answer
A) uniform resource locator.
question
The most common Web server today, controlling 59 percent of the market, is A) Microsoft IIS. B) WebSTAR. C) Apache HTTP Server. D) Netscape Server.
answer
C) Apache HTTP Server.
question
What technology allows people to have content pulled from Web sites and fed automatically to their computers? A) FTP B) RSS C) HTTP D) Bluetooth
answer
B) RSS
question
The process of employing techniques to help a Web site achieve a higher ranking with the major search engines is called A) VPN. B) IAB. C) SEM. D) SEO.
answer
D) SEO.
question
Which of the following statements is not true about search engines? A) They are arguably the Internet's "killer app." B) They have solved the problem of how users instantly find information on the Internet. C) They are monetized almost exclusively by search engine marketing. D) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.
answer
D) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.
question
Which of the following is the first generation of cellular systems suitable for watching videos? A) 2G B) 2.5G C) 3G D) 4G
answer
D) 4G
question
4G networks are also known as ________ networks. A) GSM B) CDMA C) LTD D) T-Mobile
answer
C) LTD
question
The most appropriate wireless networking standard for creating PANs is A) I-mode. B) IEEE 802.11b. C) Wi-Fi. D) Bluetooth.
answer
D) Bluetooth.
question
Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication. A) four B) six C) eight D) ten
answer
C) eight
question
Which process is used to protect transmitted data in a VPN? A) tunneling B) PPP C) VOIP D) packet-switching
answer
A) tunneling
question
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as A) touch points. B) hotspots. C) hot points. D) wireless hubs.
answer
B) hotspots.
question
The 802.11 set of standards is known as A) WLAN. B) WSN. C) Wi-Fi. D) WiMax.
answer
C) Wi-Fi.
question
The WiMax standard can transmit up to a distance of approximately A) 30 meters. B) 500 meters. C) 30 miles. D) 5 miles.
answer
C) 30 miles.
question
Passive RFID tags A) have their own power source. B) have a range of several feet. C) enable data to be rewritten and modified. D) are used in automated toll-collection systems.
answer
B) have a range of several feet.
question
Based on your reading of the examples in the chapter, what would be the best use of RFID for a business? A) logging transactions B) managing the supply chain C) lowering network costs D) enabling client communication
answer
B) managing the supply chain