NTEN 123 – IoE – Flashcards
Unlock all answers in this set
Unlock answersquestion
Ch. 1 Which statement describes a characteristic of a converged network? a. The network establishes separate communication channels for each network service. b. Network services are delivered over a wide range of network platforms. c. The network uses different technologies for voice, video, and data. d. A single network that delivers voice, video, and data to a variety of devices.
answer
d. A single network that delivers voice, video, and data to a variety of devices.
question
Ch. 1 What is the IoE? a. It is another term for the Internet. b. It is a high-speed global cellular service that quickly connects people anywhere in the world. c. It is an interconnection between people, data, process, and things to provide value. d. It is an application for connecting and configuring sensors. e. It is a security protocol for social media.
answer
c. It is an interconnection between people, data, process, and things to provide value.
question
Ch. 1 Fill in the blank. The _______ pillar of the IoE focuses on the interactions between the other three pillars so that information is provided to the right place at the appropriate time.
answer
process
question
Ch. 1 What are two functions of intermediary devices on a network? (Choose two.) A. They direct data along alternate pathways when there is a link failure. B. They are the primary source and providers of information and services to end devices. C. They run applications that support collaboration for business. D. They filter the flow of data, based on security settings. E. They form the interface between the human network and the underlying communication network.
answer
A. They direct data along alternate pathways when there is a link failure. D. They filter the flow of data, based on security settings.
question
Ch. 1 List four items that will potentially disappear from daily use within the next 25 years because of technological advancements.
answer
telephone booths video rental stores watches stamps wallets checks newspapers books telephone landlines telephone poles
question
Ch. 1 What two criteria are used to help select a network medium from various network media? (Choose two.) A. the number of intermediary devices installed in the network B. the distance the selected medium can successfully carry a signal C. the types of data that need to be prioritized D. the cost of the end devices utilized in the network E. the environment where the selected medium is to be installed
answer
B. the distance the selected medium can successfully carry a signal E. the environment where the selected medium is to be installed
question
Ch. 1 How many "things" are predicted to be interconnected on the Internet by 2020? A. 1 billion B. 5 million C. 1 million D. 50 billion
answer
D. 50 billion
question
Ch. 1 Match the core priorities of an organization to examples of the value of using the IoE. A) asset utilization B) customer experience C) supply chain D) innovation E) employee productivity i) improving customer relationships and garnering more of the market ii) reducing time to market products and improving product development to meet customer needs iii) providing processes and an environment to improve productivity and scalability iv) lower costs v) identify areas of waste and delays, while increasing logistic efficiency
answer
A) asset utilization = iv) lower costs B) customer experience = i) improving customer relationships and garnering more of the market C) supply chain = v) identify areas of waste and delays, while increasing logistic efficiency D) innovation = ii) reducing time to market products and improving product development to meet customer needs E) employee productivity = iii) providing processes and an environment to improve productivity and scalability
question
Ch. 1 What describes the Networked Economy phase of Internet development? A) It provided connections that allowed web browsing and email at limited speeds. B) It involved transitioning everything to the Internet. C) It is dominated by social media and connecting mobile devices. D) It is considered the birth of e-commerce.
answer
D) It is considered the birth of e-commerce.
question
Ch. 1 True or False? A company that uses customer feedback posted on the Internet to guide the revision of support policies is an example of a company being agile.
answer
True
question
Ch. 3 Why is Cloud computing necessary for the management of data in the Internet of Everything? A) It provides security for applications by hiding them in a Cloud. B) It provides applications and services distributed over the globe. C) It provides support for latency-sensitive applications. D) It provides a new secure and transparent programming language to create applications.
answer
B) It provides applications and services distributed over the globe.
question
Ch. 3 What is an example of a computer program that could be coded with the JavaScript scripting language? A) a mortgage monthly payment calculator on a web page B) Microsoft Word C) a game on an iPad D) the system software on an Android cell phone
answer
A) a mortgage monthly payment calculator on a web page
question
Ch. 3 Which network device maintains information on where to forward data packets to reach remote destinations? A) aggregator B) router C) controller D) actuator
answer
B) router
question
Ch. 3 Which three 802.15 protocols must forward information to an IP-enabled device to communicate on the Internet? (Choose three.) a) ZigBee b) Bluetooth c) NFC d) C++ e) Ethernet
answer
a) ZigBee b) Bluetooth c) NFC
question
Ch. 3 Fill in the blank. A default _______ must be configured on an IP-enabled end device so that the device can communicate with devices on different IP networks.?
answer
gateway
question
Ch. 3 Fill in the blank. _______ is software that is embedded into the read-only memory of devices such as watches and cell phones. This limited functionality software is often used to boot the device.
answer
firmware
question
Ch. 3 How many bits make up an IPv6 address? A) 132 B) 48 C) 128 D) 32 E) 64
answer
C) 128
question
Ch. 3 Why is a common protocol suite necessary for transmission of data over remote networks? A) to reduce the number of vendors needed B) to ensure the interoperability of devices from various vendors C) to consolidate multiple protocols for both short distance and long distance networks D) to increase the bandwidth of network connections
answer
B) to ensure the interoperability of devices from various vendors
question
Ch. 3 Which type of device will be most responsible for the explosive growth of the IoT? a) sensors b) computers c) actuators d) smart phones
answer
a) sensors
question
Ch. 3 What statement describes Fog computing? a) It supports larger networks than Cloud computing does. b) It utilizes a centralized computing infrastructure that stores and manipulates big data in one very secure data center. c) It requires Cloud computing services to support non-IP enabled sensors and controllers. d) It creates a distributed computing infrastructure that provides services close to the network edge.
answer
d) It creates a distributed computing infrastructure that provides services close to the network edge.
question
Ch. 4 A vibration sensor on an automated production line detects an unusual condition. The sensor communicates with a controller that automatically shuts down the line and activates an alarm. What type of communication does this scenario represent? A) people-to-machine B) people-to-people C) machine-to-people D) machine-to-machine
answer
D) machine-to-machine
question
Ch. 4 Which scenario is an example of M2P interactions in an IoE implementation? a) a wireless sensor obtaining an IP address dynamically b) sensors and actuators controlling equipment operation c) sensors reporting the status of equipment on a production line to a controller d) a technician investigating a condition reported by a sensor
answer
d) a technician investigating a condition reported by a sensor
question
Ch. 4 What process in a basic wireless security implementation is used to encode information so that only authorized individuals can read it? a) authorization b) authentication c) encryption d) polarization
answer
c) encryption
question
Ch. 4 Connecting things in the IoT requires the convergence of information technology and ___________ technology within an organization. a) analytical b) operational c) infrastructure d) financial e) statistical
answer
b) operational
question
Ch. 4 What effect is the Internet of Things expected to have on the amount of data generated on the Internet? a) exponential growth b) stay about the same c) dramatic decrease
answer
a) exponential growth
question
Ch. 4 The IoE can improve employee productivity through empowering employees with tools to complete their work where and how they need. True/False?
answer
True
question
Ch. 4 Which two types of devices can be used to protect end devices in the IoE from attacks? (Choose two.) a) sensor b) firewall c) DSL and cable modems d) file server e) intrusion prevention system
answer
b) firewall e) intrusion prevention system
question
Ch. 4 Which layer of the Cisco IoE architectural approach includes the proper mix of hardware and software within the corporate environment, Cloud, and service provider network? a) network b) platform c) infrastructure d) application
answer
c) infrastructure
question
Ch. 4 In the Cisco Streamlines Old Mining Operations video, what type of device would monitor the truck drivers for alertness? a) sensor b) satellite c) actuator d) wireless router e) GPS
answer
a) sensor
question
Ch. 2 As IoE connections are evolving, which component will change to get the right information to the right place at the right time more efficiently? things people intelligence process
answer
process
question
Ch. 2 A few days ago, a person was browsing a website that sells sporting goods. After some time, this person receives an email from the same website about a sale on a similar item. What kind of business practice is this?? telemarketing retail marketing micromarketing
answer
micromarketing
question
Ch. 2 Which scenario is an example of an M2M interaction in a retail IoE solution? When a customer removes an item from the shelf, the RFID tag sends an inventory update message to the ordering management system. A customer uses a kiosk to order food in a gas station. A customer reviews the receipt after paying the shopping expense with a credit card. An employee replenishes canned fruits to a shelf after the sensor sends the signal that the shelf is almost empty.
answer
When a customer removes an item from the shelf, the RFID tag sends an inventory update message to the ordering management system.
question
Ch. 2 In a new smart home, the refrigerator has a sensor that detects that the milk container is almost empty. To what device would this sensor send this data so that eventually a text message is sent to the home owner? sensor server Internet provider server controller RFID
answer
controller
question
Ch. 2 True or False? The term big data refers only to the amount of data being generated?
answer
False
question
Ch. 2 How do packets travel across the Internet? They are packet switched independently, from router to router, along the best path. An end-to-end circuit is created between the source and destination before the packets are transmitted. The ISP of the sender communicates with the destination device to determine the path the packets should take through the Internet. They are broadcast across all links on the Internet until they are received by the destination device.
answer
They are packet switched independently, from router to router, along the best path.
question
Ch. 2 What is the purpose of an IP address? It identifies the source and destination of data packets on a network. It identifies a return address for replying to email messages. It identifies a location in memory from which a program runs. It identifies the physical location of a data center.
answer
It identifies the source and destination of data packets on a network.
question
Ch. 2 A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation? maintaining communication integrity virtualization BYOD online collaboration
answer
virtualization
question
Ch. 2 What are two reasons that electronic data is represented as bits? (Choose two.) Bits are more secure and make transmissions harder to hack. Bits are more efficient for storing data. Bits are the format best understood by people. Bits can be transmitted over longer distances without quality degradation. Bits decrease the number of connections that need to be made in the IoE.
answer
Bits are more efficient for storing data. Bits can be transmitted over longer distances without quality degradation.