MISY 160 TIA Exam #2 – Flashcards
Unlock all answers in this set
Unlock answersquestion
A large network designed to provide access to a specific geographic area, such as a large city is a __________. A. MAN B. PAN C. LAN D. WAN
answer
A. MAN
question
2. All of the following are benefits of networks EXCEPT, _________. A. sharing an Internet connection B. sharing printers and other peripherals C. sharing files D. sharing an operating system
answer
D. sharing an operating system
question
3. A network used to communicate among devices close to one person is called a ________. A. MAN B. LAN C. PAN D. WAN
answer
C. PAN
question
5. ________ is software that takes an existing Internet connection and turns it into a wireless hotspot. A. Netify B. Multiply C. Mobilefy D. Connectify
answer
D. Connectify
question
6. The most popular transmission media option for wired Ethernet networks is __________. A. fiber-optic cable B. power-line cable C. unshielded twisted-pair (UTP) cable D. coaxial cable
answer
C. unshielded twisted-pair (UTP) cable
question
7. All of the following involve tasks for network administration, EXCEPT ________. A. installing new computers and devices on the network B. updating and installing new software on the network C. setting up proper security for a network D. purchasing initial equipment for the network
answer
D. purchasing initial equipment for the network
question
8. A(n) ________ is a device connected to a network such as a computer or a game console. A. architecture B. node C. server D. modem
answer
B. node
question
9. A computer network is defined as two or more computers connected via ________ so that they can communicate with each other. A. software and hardware B. the Internet C. at least one server D. Ethernet cable
answer
A. software and hardware
question
10. For the nodes on a network to communicate with each other and access the network, each node needs a __________. A. DSL modem B. network adapter C. network interface card D. router
answer
B. network adapter
question
All of the following are used to classify network architectures, EXCEPT _____________. A. the distance between nodes B. the protocol used to exchange data between nodes C. the communication medium used to transport data D. the number of nodes on the network
answer
D. the number of nodes on the network
question
Which of the following is NOT a type of UTP cable you would use in a wired Ethernet home network? A. Cat 5E B. Cat 6 C. Cat 6A D. Cat 7B
answer
D. Cat 7B
question
________ is the maximum speed at which data can be transferred between two nodes. A. Throughput B. Bandwidth C. Band Speed D. Through Speed
answer
B. Bandwidth
question
Network adapters _________. A. are built into the motherboard on each node B. enable nodes in a network to communicate with each other C. are always Ethernet NICS D. are necessary only on servers in a client/server network
answer
B. enable nodes in a network to communicate with each other
question
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address. A. MAC B. IP C. SSID D. network
answer
A. MAC
question
A ________ is a network located in your home that connects to all your digital devices. A. MAN B. WAN C. HAN D. LAN
answer
C. HAN
question
SSID stands for ________. A. service set identity B. service set identifier C. service security identity D. service security identifier
answer
B. service set identifier
question
All of the following operating systems support P2P networking, EXCEPT ________. A. Windows B. OS X C. Unix D. Linux
answer
C. Unix
question
Using a network without the network owner's permission is known as ________. A. hijacking B. chillijacking C. piggybacking D. hybacking
answer
C. piggybacking
question
Sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network? A. Routers and switches B. USB ports C. Firewalls D. Network interface cards (NIC)
answer
A. Routers and switches
question
Network architectures are classified according to _______. A. the distance between the hub and the router B. the bandwidth supplied by the connection C. the way in which they are managed and the distance between their nodes D. the speed at which they processor runs
answer
C. the way in which they are managed and the distance between their nodes
question
A ________ network is located in your home that connects to all your digital devices. A. MAN B. WAN C. HAN D. LAN
answer
C. HAN
question
A peer-to-peer network is an example of ______ administration. A. local B. wide area C. central D. corporate
answer
A. local
question
All of the following are extra precautions you can take to secure a wireless network, EXCEPT ________. A. change your network name (SSID) B. enable SSID broadcast C. turn on security protocols D. create a passphrase
answer
B. enable SSID broadcast
question
Data are sent through a network on bundles called ______. A. packages B. pouches C. packets D. switches
answer
C. packets
question
The current version of wireless Ethernet is ______. A. 802.11m B.802.11g C.802.11p D.802.11n
answer
D.802.11n
question
Normal telephone cable is a type of ________. A. fiber-optic cable B. twisted-pair cable C. coaxial cable D. Ethernet cable
answer
B. twisted-pair cable
question
Which transmission medium transmits data the fastest? A. Twisted-pair cable B. Coaxial cable C. Wireless D. Fiber-Optic cable
answer
D. Fiber-Optic cable
question
Client/Server networks are controlled by a central server that runs a special piece of software called _______. A. Windows 7 B. network operating system (NOS) C. firewall D. firmware
answer
B. network operating system (NOS)
question
A client/server network is an example of ________ administration A. Local B. Wide Area C. Central D. Corporate
answer
C. Central
question
Wireless internet is available using _________. A. Fiber Optics B. Satellite C. Radio Waves D. DSL
answer
C. Radio Waves
question
Which of these statements about physically protecting your computer is FALSE? A. The computer should sit on a flat level surface. B. Power surges can be blocked by using a computer surround. C. It is best to unplug computers during an electrical storm. D. Old surge protectors can deliver power to your computer without protecting it.
answer
B. Power surges can be blocked by using a computer surround.
question
_________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet. A. Adware B. Malware C. Shareware D. Spyware
answer
D. Spyware
question
Which type of virus was the famous Michelangelo virus? A. A worm B. A time bomb C. A script virus D. An e-mail virus
answer
B. A time bomb
question
When malicious code is planted on your computer and alters your browser's ability to find Web addresses it is known as ________. A. phishing B. pharming C. pretexting D. phlying
answer
B. pharming
question
Adware and spyware are referred to collectively as __________. A. viruses B. grayware C. altertware D. firmware
answer
B. grayware
question
All of the following are ways that can infect your computer with a virus, EXCEPT _________. A. sharing flash drives B. downloading video files from peer-to-peer sites C. downloading or running an e-mail attachment file D. logging into e-mail
answer
D. logging into e-mail
question
IC3 is a partnership between the _________. A. FBI and local police departments B. FBI and National Defense Department C. FBI and National White Collar Crime Center D. National White Collar Crime Center and National Defense Department
answer
C. FBI and National White Collar Crime Center
question
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as __________. A. packet filtering B. packet switching C. static addressing D. logical port blocking
answer
D. logical port blocking
question
A __________ virus changes its own code or periodically rewrites itself to avoid detection. A. multipartite B. stealth C. polymorphic D. polypertite
answer
C. polymorphic
question
_________ floods a computer with requests until it shuts down and refuses to answer any requests for information. A. A Trojan horse B. A polymorphic virus C. A DDoS attack D. Port blocking
answer
C. A DDoS attack
question
A _____ is a virus that is triggered on a certain date. A. worm B. script C. logic bomb D. time bomb
answer
D. time bomb
question
All of the following are top cybercrimes reported to IC3 in 2011, EXCEPT __________. A. Identity Theft B. non-auction/non-delivery of merchandise C. advance fee fraud D. child pornography
answer
D. child pornography
question
Which of the following classification of viruses can change its own code to avoid detection? A. Stealth B. Multipartite C. Polymorphic D. Worm
answer
C. Polymorphic
question
A _____________ is a virus that is attached to documents such as a word or excel files. A. script virus B. Macro virus C. Polymorphic Virus D. Worm
answer
B. Macro virus
question
Rules for creating passwords include all of the following, EXCEPT ____. A. Keep your password a secret B. Change your password frequently C. Keep your password written down and stored in any easy-to-remember location D. Create a hard-to-guess password, with a combination of letter, numbers, and symbols
answer
C. Keep your password written down and stored in any easy-to-remember location
question
All of the following are considered cybercrimes, EXCEPT ____. A. identity theft B. non-delivery of merchandise C. theft of a cell phone D. hacking
answer
C. theft of a cell phone
question
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? A. social networking B. cybercrime c. phishing d. hacking
answer
B. cybercrime
question
With regard to computer protection, quarantining is defined as ________. A. updating your antivirus software B. placing a found virus in a secure area in the hardware C. repairing an infected file d. deleting an infected file
answer
B. placing a found virus in a secure area in the hardware
question
________ viruses are often transmitted by a flash drive left in a USB port. A. logic bomb B. boot-sector C. macro D. encryption
answer
B. boot-sector
question
Which of the following statements about cookies is NOT true? A. Cookies obtain your personal information by searching your hard drive. B. Cookies are text files. C. Cookies help companies determine the traffic flow through their Web site. D. Some companies sell the personal information found in cookies to other companies
answer
A. Cookies obtain your personal information by searching your hard drive.
question
All of the following are categories of viruses, EXCEPT ________. A. snakes B. boot sector C. email D. encryption
answer
A. snakes
question
FBI-related scams involve ________. A. people pretending to represent official organizations B. running auctions that do not exist C. convincing people to send money as a "good faith" gesture D. collecting funds and not delivering the goods
answer
A. people pretending to represent official organizations
question
A ________ is named after a housing construction feature that slows the spread of fires from house to house. A. firehouse B. wallfire C. firewall D. fire protector
answer
C. firewall
question
A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT _______. A. use your debit card information to purchase items illegally B. assume your identity C. steal your logon and passwords for various accounts D. launch a denial of service (DoS) attack on your computer
answer
D. launch a denial of service (DoS) attack on your computer
question
CAPTCHA stands for _______. A. Completely Amazing Public Turing Test to Tell Computers and Humans Apart B. Completely Automated Private Turing Trial to Tell Computers and Humans Apart C. Completely Automated Public Turing Test to Tell Computers and Humans Apart D. Complete Automated Public Turing Trial to Tell Computers and Humans Apart
answer
C. Completely Automated Public Turing Test to Tell Computers and Humans Apart
question
One virus called _______ is used to trick users into downloading an infected file to their phone, which steals online banking information. A. Spyware Mobile Banking B. Spyeye Mobile Banking C. Spyware Online Banking D. Spyeye Online Banking
answer
B. Spyeye Mobile Banking
question
The protocol using port 53 is ______. A. FTP control B. STMP C. DNS D. HTTP
answer
C. DNS
question
You can block logical ports to invaders and make your computer invisible to others on the internet by installing _____. A. a packet sniffer B. a firewall C. a packet filter D. antivirus software
answer
B. a firewall
question
A(n) ______ takes advantage of file transport methods to spread on their own. A. worm B. script C. encryption D. time bomb
answer
A. worm
question
Creating and disseminating ______ is one of the most widespread types of crimes. A. Spam B. Computer viruses C. fake credit cards D. FBI related scams
answer
B. Computer viruses
question
All of the following are the main functions of antivirus software, EXCEPT _______. A. Looking for virus signatures B. quarantining viruses C. inoculating key files D. assassinating all viruses
answer
D. assassinating all viruses
question
Social ____________ is an unwanted piggyback program that usually downloads with software you are installing from the internet. A. Engineering B. Theft C. Pretexting D. Pharming
answer
A. Engineering
question
1. A _________ displays a subset of data from a table (or tables) based on the criteria specified. A. database query B. join query C. select query D. criteria query
answer
C. select query
question
What does the acronym DBMS stand for? A. Database modeling system B. Database management system C. Data building and modeling system D. Data browsing and management system
answer
B. Database management system
question
__________ involves putting data into an electronic file in a format that another application can understand. A. Exporting B. Importing C. Batch processing D. Data mining
answer
A. Exporting
question
Classification, affinity grouping, and estimation are _________ methods used by managers to make their data more meaningful. A. modeling B. staging C. artificial intelligence D. data mining
answer
D. data mining
question
Which of the following is NOT a main operation of a database management system (DBMS)? A. Creating databases and entering data B. Implementing data mining C. Viewing and sorting data D. Outputting data
answer
B. Implementing data mining
question
A Web address is stored as a(n) ________ field in a database. A. hyperlink B. text C. address D. memo
answer
A. hyperlink
question
In a data warehouse, data gathered from sales, billing, and inventory departments are examples of ________ sources. A. internal data B. external data C. metadata D. exported data
answer
A. internal data
question
Management information systems (MIS) provide reports called __________, which show conditions that are unusual or need attention from users of the system. A. detail reports B. summary reports C. exception reports D. expert reports
answer
C. exception reports
question
__________ databases have the largest market share among the primary types of electronic databases. A. Relational B. Flat-file C. Multidimensional D. Object-oriented
answer
A. Relational
question
A(n) ___________ check determines whether all required fields were entered with appropriate data. A. completeness B. range C. consistency D. alphabetic
answer
A. completeness
question
An example of ________ is customer demographic data purchased from third parties or statistics compiled by the federal government. A. internal data B. external data C. imported data D. metadata
answer
B. external data
question
In a transaction-processing system (TPS), if the TPS database is queried and updated while the transaction is taking place, this is called ________ processing. A. direct B. batch C. real-time D. immediate
answer
C. real-time
question
Which of the following is NOT a typical disadvantage associated with databases? A. Databases can be expensive to set up. B. Databases are usually more complex to administer. C. Databases are more complex to construct. D. Database information cannot be changed once it is entered.
answer
D. Database information cannot be changed once it is entered.
question
In a database, a ________ is a group of related fields. A. file B. list C. record D. table
answer
C. record
question
A data ________ is a large-scale electronic repository of data that contains and organizes all of an organization's data in one place. A. mart B. chain C. warehouse D. storehouse
answer
C. warehouse
question
In a database, a group of related records is called a(n) ________. A. memo B. field C. object D. table
answer
D. table
question
In a transaction-processing system, if transaction data are accumulated until a certain point and then many transactions are processed all at once, this is called ________ processing. A. delayed B. batch C. real-time D. group
answer
B. batch
question
In a relational database, what is a relationship? A. A link between tables that defines how the data are related B. The primary key in the database C. The links among databases D. The array of tables in a database
answer
A. A link between tables that defines how the data are related
question
Data staging consists of all of the following steps, EXCEPT ________. A. transformation of data B. mining of data C. storage of data in a warehouse D. extraction of data
answer
B. mining of data
question
An individual trained in the design and building of databases is called a database ________. A. master B. technician C. administrator D. analyst
answer
C. administrator
question
Which of the following is NOT a type of management information system (MIS) report? A. Detail B. Summary C. Redundancy D. Exception
answer
C. Redundancy
question
In a transaction-processing system, if transaction data are accumulated until a certain point and then many transactions are processed all at once, this is called ______ processing. A. delayed B. batch C. real-time D. group
answer
B. batch
question
A _____ relationship indicates that for each record in a table, there is only a single corresponding record in a related table. A. many-to-one B. one-to-many C. one-to-one D. many-to-many
answer
C. one-to-one
question
A ______ check allows you to set credits allowed for students during one quarter from 0 to 21. A. completeness B. range C. consistency D. numeric
answer
B. range
question
Data ______ means that the data contained in a database is accurate and reliable. A. efficiency B. integrity C. redundancy D. consistency
answer
B. integrity
question
When you want to extract data from two or more tables, you use a(n) _____ query. A. select B. join C. relational D. object
answer
B. join
question
A _____ check compares the values of data in two or more fields to see whether those values are reasonable. A. correctness B. range C. consistency D. numeric
answer
C. consistency
question
Which of the following is NOT a data source for a data warehouse? A. Internal sources B. External sources C. Data mine D. Clickstream data
answer
C. Data mine
question
_____ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table. A. Referential integrity B. Normalization C. Database consistency D. Record integrity
answer
A. Referential integrity
question
A _____ temporarily displays records that match the specified criteria. A. sieve B. filter C. validation rule D. field constraint
answer
B. filter
question
In a database, a chart is stored in a(n) ______ field. A. text B. object C. memo D. hyperlink
answer
B. object
question
If a business keeps two lists, one for employee payroll and one for employee benefits information, both containing name and address information, this is an example of data ________. A. integrity B. redundancy C. completeness D. normalization
answer
B. redundancy
question
Unstructured data such as video clips and pictures are known as _____ because of the way they are encoded. A. hyperlink fields B. multidimensional data C. binary large objects (BLOBs) D. metadata
answer
C. binary large objects (BLOBs)
question
A ____ is a collection of related data that can be stored, sorted, organized, and queried. A. database B. list C. filter D. data mine
answer
A. database
question
In a database, ______ fields store numbers used to perform calculations. A. date B. numeric C. computational D. alphanumeric
answer
B. numeric
question
The Siri speech-recognition feature on Apple's iPhone 4s is an examples of a ______. A. natural language processing (NLP) system B. decision support system C. management information system (MIS) D. database management system (DBMS)
answer
A. natural language processing (NLP) system
question
A database schema is also called a(n)____. A. information system B. summary report C. relation D. data dictionary
answer
D. data dictionary
question
In a database, a _______ is synonymous with a category of information A. field B. record C. row D. table
answer
A. field
question
A(n) __________ is a way of retrieving information from one or more table that defines a particular subset of data. A. validation rule B. field constraint C. enquiry D. query
answer
D. query
question
If a numeric field has a size of 5, which is the highest number it can hold? A. 5 B. 99999 C. 55555 D. 50000
answer
B. 99999
question
Data in a multidimensional database is organized in a _______ format. A. Linear B. Table C. Cube D. Cellular
answer
C. Cube
question
________ databases have the largest market share among the primary types of electronic databases. A. Relational B. Flat-file C. Multidimensional D. Object Oriented
answer
A. Relational
question
If fair allocation of network access is a major requirement of the network, choose a _______ topology. A. cluster B. ring C. bus D. star
answer
B. ring
question
Which of the following is NOT a factor to consider when selecting network cabling? A. Cable diameter B. Interference C. Maximum run length D. Bandwidth
answer
A. Cable diameter
question
Which of the following is the most commonly used client/server network topology? A. Star B. Cluster C. Ring D. Hierarchical
answer
A. Star
question
Which cable type is the most costly to install? A. Fiber-optic B. Twisted-pair C. ThinNet coaxial D. ThickNet coaxial
answer
A. Fiber-optic
question
For business networks, which of the following is NOT a main cable type? A. Twisted-pair B. Coaxial C. Duplex D. Fiber-optic
answer
C. Duplex
question
A print server uses a print ____ as a software holding area for printing jobs. A. stack B. queue C. buffer D. heap
answer
B. queue
question
An _____ needs to be installed on each client computer and server connected to the network to provide the services necessary for them to communicate. A. application software B. network operating system C. protocol guideline D. switch
answer
B. network operating system
question
____ networks contain servers as well as computers that individual users access and use. A. Client/server B. Peer-to-peer C. Switch D. CSMA/CD
answer
A. Client/server
question
Which of the following networks is most known for data collisions? A. Star B. Bus C. Hierarchical D. Cluster
answer
B. Bus
question
Ring networks use the ________ method avoid data collisions. A. packet screening B. active-check C. token D. passive-check
answer
C. token
question
A(n) _________ is used exclusively within a corporation or organization. A. VPN B. intranet C. extranet D. Internet
answer
B. intranet
question
. Which of the following is something a network adapter does NOT do? A. It uses high-powered signals so data can move easily over network transmission media. B. It allows or denies access to the computer in which it is installed. C. It verifies that all information transmitted from the computer is correctly received by the recipient. D. It breaks down data and puts it into packets.
answer
C. It verifies that all information transmitted from the computer is correctly received by the recipient.
question
A _________ keeps your computer safe by confirming who is trying to access it. A. gateway B. firewall C. hub D. switch
answer
B. firewall
question
________ cable is NOT subject to electromagnetic interference or radio frequency interference. A. Twisted-pair B. Fiber-optic C. Polycarbonate D. Coaxial
answer
B. Fiber-optic
question
A(n) _________ server tracks who is logging on to the network as well as which services on the network are available to each user. A. gateway B. authentication C. dedicated D. file
answer
B. authentication
question
P2P networks become difficult to manage when they are expanded beyond __________ users. A. 5 B. 10 C. 20 D. 50
answer
B. 10
question
A(n) _________ address is the address external entities use to communicate with your network. A. AL B. MAC C. WI D. IP
answer
D. IP
question
________ are often equipped to act as hardware firewalls. A. Repeaters B. Switches C. Jammers D. Routers
answer
D. Routers
question
What is CSMA/CD? A. a type of network topology B. a special signal of a star network C. a method used to avoid data collisions D. the central communication device on a star or ring network
answer
C. a method used to avoid data collisions
question
A ________ is a set of rules for how information and communication are exchanged. A. protocol B. token C. switch D. packet
answer
A. protocol
question
Which of the following is NOT a common network topology? A. star B. cluster C. bus D. ring
answer
B. cluster
question
A ________ uses the public Internet communications infrastructure to build a secure, private network. A. LAN B. WAN C. VPN D. MAN
answer
C. VPN
question
Facial recognition is an example of ________ authentication. A. access B. photo C. verification D. biometric
answer
D. biometric
question
What is another name for the physical address assigned to each network adapter? A. Network Access Control (NAC) B. Physical Address Control (PAC) C. Network Physical Address (NPA) D. Media Access Control (MAC)
answer
D. Media Access Control (MAC)
question
_______ interference is a type of signal interference in wired transmission media that can be caused by fluorescent lights or machinery with motors or transformers. A. Radio frequency interference B. Transitional C. Crosstalk D. Electromagnetic
answer
D. Electromagnetic
question
Which of the following networks has high scalability? A. Star B. Ring C. Bus D. Hybrid
answer
A. Star
question
When a client computer connects to a network and requests the use of Microsoft Office 2010, the ______ server delivers the software to the client computer. A. communication B. database C. application D. file
answer
C. application
question
The ends of the cable in a bus network use a(n)_____ to absorb a signal so that it is not reflected back onto parts of the network that have already received the signal. A. endcap B. terminator C. stopper D. block
answer
B. terminator
question
A ______ is a network used by one person connected via wireless media. A. WAN B. LAN C. MAN D. PAN
answer
D. PAN
question
Which is NOT a networking protocol? A. Apple File Protocol (AFP) B. NetBios Extended User Interface (NetBEUI) C. Internet Packet Exchange (IPX) D. HyperText Transfer Protocol (HTTP)
answer
D. HyperText Transfer Protocol (HTTP)
question
A _____ allows multiple users to connect to the Internet through one connection A. file server B. hub C. network D. packet screener
answer
C. network
question
Which of the following causes interference when a cable is exposed to strong electromagnetic fields? A. EMI B. RFI C. STP D. IEEE
answer
A. EMI
question
In a network that uses the star topology, the signal that is sent to indicate a signal collision is called a ____. A. hit B. crash C. stop D. jam
answer
D. jam
question
Which of the following devices sends data from one collision domain to another? A. Switch B. Bridge C. Link D. Band
answer
B. Bridge
question
A _________ keeps your computer safe by confirming who is trying to access it. A. Gateway B. Firewall C. Hub D. Switch
answer
B. Firewall
question
35. Using your computer for non-work activities while you are being paid to do your job is known as ________. A. cyberloafing B. cybersleeping C. cyberlazing D. cyberbreaking
answer
A. cyberloafing
question
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network. A. viewing B. Browsing C. filtering D. screening
answer
D. screening
question
The standard communications protocol used on most client/server networks is ________. A) Ethernet B) NOS C) TCP/IP D) VPN
answer
A) Ethernet
question
Which cable type is the most costly to install? A) Fiber-optic B) Twisted-pair C) ThinNet coaxial D) ThickNet coaxial
answer
A) Fiber-optic
question
________ is a protective layer made of glass or plastic, which is wrapped around the core of a fiber-optic cable for protection. A) Shielding B) Cladding C) Sheathing D) Coating
answer
B) Cladding
question
A ________ topology is created when more than one topology is used to build a network. A) hybrid B) multiple-use C) fusion D) crossover
answer
A) hybrid
question
The star topology uses a central ________ to connect all network nodes. A) terminator B) gateway C) switch D) router
answer
C) switch
question
A(n) ________ server is a server that stores and manages files for network users. A) file B) e-mail C) print D) database
answer
A) file
question
Which of the following is FALSE about servers? A) Servers are the workhorses of the client/server network. B) Servers interface with many different network users. C) A file server stores and manages files for a network. D) All networks require at least two servers
answer
D) All networks require at least two servers
question
In a(n) ________ network, each node connected to the network communicates directly with every other node. A) Client/server B) Peer-to-peer C) Intranet D) Extranet
answer
B) Peer-to-peer
question
Which of the following is NOT an advantage of using networks as compared to a stand-alone computer? A) Enable software sharing B) Facilitate knowledge sharing C) Enhanced communication capabilities D) Ease of maintenance and administration
answer
D) Ease of maintenance and administration