Digital Subscriber Line Flashcards, test questions and answers
Discover flashcards, test exam answers, and assignments to help you learn more about Digital Subscriber Line and other subjects. Don’t miss the chance to use them for more effective college education. Use our database of questions and answers on Digital Subscriber Line and get quick solutions for your test.
We've found 11 Digital Subscriber Line tests
Computer Networks
Digital Subscriber Line
Really Simple Syndication
Uniform Resource Locator
MISY Final: a Filtering Programs, Control the Timing of Computer, System Software – Flashcards 356 terms

Patrick Turner
356 terms
Preview
MISY Final: a Filtering Programs, Control the Timing of Computer, System Software – Flashcards
question
A ___ is a program that extends the capability of a browser.`
answer
plug-in
question
___ is data that has been processed into a useful form.
answer
Output
question
Advantages of portable hard disks and removable hard disks
answer
Transports large number files, add storage space to notebook computer, easily store large audio/video files
question
A reasonable quality ink-jet printer costs ____.
answer
less than $100
question
To write on a CDRW disc, users must has software and ____.
answer
drive
question
Broadcast radio is ___ susceptible to mouse then physical transmission media but provides flexibility and portability.
answer
slower and more
question
A ___ is a program that removes or blocks certain items from being displayed
answer
filter
question
A ____ provides a mobile user with secure connection to connection to company network server
answer
virtual private network
question
In a relational database, each row has a ____ and each column has a _____.
answer
primary key and unique name
question
A comm ____ is a transmission media on which date, interactions, and info travel
answer
channel
question
___ refers to core activities of a business, involving creation, selling, and support of products
answer
Operations
question
Planning, performed by managers, involves _____.
answer
establishing goals and objectives
question
___ cable consists of a single copper wire surrounded by at least three layers: insulation, woven metal, plastic coating
answer
Coaxial
question
A ____ is a small text file that a web servers stores on a users computer.
answer
cookie
question
____ occurs when someone steals personal or confidential information.
answer
Information theft
question
High-availability system may include ___ components that allow for a functioning component to take over automatically of one that fails.
answer
redundant
question
A ____ is someone who tries to access a computer or network illegally.
answer
hacker
question
A ____, also called program logic, is a graphical or written description of step by step procedures to solve problem.
answer
solution algorithm
question
A ___ stationary pointing device with a ball on its top or side (similar to mechanical mouse)
answer
trackball
question
_____ commonly describes a business or venture of any size.
answer
Enterprise
question
A ___ source is a company or person a user believes will not knowingly send a virus-infected file
answer
trusted
question
The ___ interprets and carries out basic instructions that operate a computer
answer
CPU (Central Processing Unit)
question
An _____ allows users to share documents with others in real time.
answer
online meeting
question
Devices including ____, ____, _____, often have internal miniature hard disks.
answer
Media players, digital cameras, smart phones, not laptops
question
An ______ program is filtering program that attempts to remove spam before it reaches a users inbox
answer
anti-spam
question
E-commerce that actually takes place between businesses is called _____
answer
B2B e-commerce
question
A ____ drive is the drive from which a personal comp starts
answer
boot
question
____ is a program placed on computer without users knowledge that secretly collects info about the user
answer
Spyware
question
____ uses a modem that sends digital data and info from a computer to a DSL line
answer
DSL
question
A _____ is a duplicate of a file, program, or disk that can be used if the original is lost
answer
backup
question
The advantage of custom software is that it _________.
answer
matches a company's requirements exactly
question
______ use is the use of a computer or its data for unapproved or illegal activities.
answer
Unauthorized
question
The _____ is the core of an operating system that maintains computers clock, starts application, and assigns resources (devices, programs, data, and info)
answer
kernel
question
____ is the process of planning, scheduling, and then controlling the activities during system development cycle.
answer
Project management
question
A ____ is an opening inside the system unit in which additional equip can be installed.
answer
bay
question
A ____ is malware that copies itself repeatedly
answer
worm
question
The machine language version that results from compiling a 3GL is called the ______
answer
object code or program
question
A ___ player is a program that allows you to view images and animation, listen to audio, and watch videos
answer
media
question
___ is an unsolicited email sent to many recipients at once
answer
Spam
question
In Windows 7, Windows ____ feature protects your comp from external threats
answer
Defender
question
Info ____ refers to the right to deny or restrict the collect and use of info about users
answer
privacy
question
A programming language's ___ is a set of grammar and rules that specifies how to write instructions for a solution algorithm.
answer
syntax
question
_____ info is gathered in the ongoing operations of an enterprise-sized organization
answer
Enterprise
question
A ____ program is a utility that protects a comp against viruses by identifying and removing any viruses.
answer
antivirus
question
Organized set of program development activities is known as the program life development ______.
answer
cycle
question
A ____ is a wireless network that provides Internet connection to mobile devices
answer
hot spot
question
_____ is the process of comparing data with a set of rule to find out if data is correct
answer
Validation
question
With _______ memory, the operating system allocates a portion of a storage medium, the hard ski, to function as additional RAM.
answer
Virtual
question
_____ is a network standard that specifies no central device on the network should control when data can be transmitted
answer
Ethernet
question
The location in a retail store where a consumer pays for goods or services is ____.
answer
POS
question
Syntax errors will be cause by _____, ______, _______.
answer
misspelling a command, leaving out punctuation, typing words out of order, NOT using wrong control structure
question
An ______ system is an info system that captures and stores knowledge of human experts then imitates reasoning and decision making.
answer
expert
question
A _____ is a working model of a proposed system.
answer
Prototype
question
Scope ____ occurs when one activity in a project has led to another that was not originally planned, thus scope has grown`
answer
creep
question
Many companies use OCR character on a ____ document, which is returned to company that creates and sends it.
answer
turnaround
question
A _____ is a comm device that connects multiple comps together and transmits data to its correct destination on a network
answer
router
question
In doc management system, a central library or ______ stores all documents within a company
answer
repository
question
An alt to maintaining an alt computer facility is to enter into a _______ backup relationship with another firm, where one firm provides space to other in case of disaster.
answer
reciprocal
question
______ computing involves the use of computers in networks (LAN and WAN) that encompass a variety of diff operating systems, protocols, and network architectures.
answer
Enterprise
question
_____ storage is an internet service that provides storage to computer users
answer
Cloud
question
____ is a collection of unprocessed items which can include text, numbers, images, audio and video.
answer
Data
question
Google Docs is a cloud storage provide for ____, ____, ____.
answer
spreadsheets, presentations, documents but NOT emails
question
If back file is used, a ____ program reverses the process and returns backed up files to original form
answer
restore
question
Programs that act without users knowledge to alter computer operations (virus, worm, trojan horse, root kit)
answer
Malware
question
A ____ info system generates accurate and organized info so managers can make decisions, solutions, supervise, and track progress
answer
management
question
Video ____ is the process of capturing full motion images into a computer and storing them on a storage medium
answer
input
question
_____ systems continue running and performing tasks for at least 99% of the time.
answer
High-Availability
question
Most retail stores use ____ terminal to record purchases, credit, debit, and inventory
answer
POS
question
____ includes information about files and data called metadata
answer
CMS (Content management system)
question
In operating system, ____ can fix bugs, enhance security, and modify device drivers.
answer
automatic updates
question
Windows ____ is an upgrade to Windows 2003 Server.
answer
Server 2008
question
___ software tracks leads and inquiries from customers, store history of all sales to customer, and allows for tracking of outstanding issues with customers
answer
CRM (Customer relationship management)
question
An ____ disc is a storage media type that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
answer
optical
question
____ software is application software developed by user or at users request
answer
custom
question
An _____ reader is a device that uses light source to read characters, marks, and codes then coverts them into digital data that comp can process
answer
optical
question
To convert an assembly language source program into machine language, programmers use an ______.
answer
assembler
question
Two types of system software are _____.
answer
operating systems and utility programs
question
Internet ad firms often use ____ to collect info about users web habits
answer
spyware
question
A _____ is a system that manages one or more human resource function
answer
HRIS (human resource info system)
question
With _____, users invest in stocks, options, bonds, treasuries, and so on without using a broker
answer
online trading
question
a _____ backup copies all of the files in a computer
answer
full backup
question
Tape storage requires ___ access, which refers to reading or writing data consecutively
answer
sequential
question
A spyware ____ is a program that detects and deletes spyware and similar programs.
answer
remover
question
Content ____ is the process of restricting access to certain material on the web.
answer
filtering
question
Comp ___ occurs when a computer consumes someones entire social life
answer
addiction
question
Two examples of ______ are cable television lines and telephone lines.
answer
comm channels
question
____ is a technology that reads hand draw marks such as small circles or rectangles
answer
OMR (optical mark recognition)
question
A ____ does not replicate itself to other computers
answer
trojan horse
question
___ computing provides computing needs to computer users via Internet
answer
Cloud
question
____ systems manage info about costumers, interactions, past purchase, and interests.
answer
CRM (customer relationship management)
question
An _____ network, most recent net standard, conforms to the gov security standards and uses more sophisticated encryption than WPA
answer
802.11i
question
A UPS connects between a computer and a _____
answer
power source
question
A ____ backup (partial) allows user to choose specific files to backup
answer
selective
question
Some external peripherals have an AC ______, which is an external power supply.
answer
adapter
question
Software ____ occurs when someone steals software media, intentionally erase programs, or illegally copies.
answer
theft
question
Digital ____ is the discovery, collection, and analysis of evidence found on comps and networks.
answer
forensics
question
An ____ system is a collection of hardware, software, data, people, and procedures that work to produce quality information.
answer
information
question
A _____ system automates and manages much of the communications between employees and businesses
answer
ERM (Employee Relationship Mgt)
question
___ occurs when retailers use web to sell their products or services
answer
E-tail
question
A ____ identifier is a physiological or behavioral characteristic such as fingerprints and eye patterns.
answer
biometric
question
____ is the transmission of messages and files via computer network
answer
Email
question
____ high speed internet connections use antenna on a house or business to communicate with a tower location via radio signals
answer
Fixed wireless
question
A cable ___ allows access to high sped internet service through cable television network
answer
modem
question
The BIOS executes a series of test, called ____, which check various system components including buses, clock, adapter cards, RAM chips and drives.
answer
POST (power on self test)
question
Many businesses use __ to limit employees web access
answer
content filtering
question
In the latest Windows conversion, the __ consists of several files that contain system configuration info.
answer
registry
question
Many cloud storage providers offer _____
answer
encryption, web apps, passwords
question
____ holds data, instructions, and info for future use.
answer
Storage
question
The core of a _____ cable consists of dozens/hundreds of thin strands of glass or plastic that use light to transmit signals
answer
fiber-optic
question
____ is a combo of an electric cash register, bar code reader, and printer.
answer
POS
question
Software ___ is an unauthorized and illegal duplication of copyrighted software.
answer
piracy
question
A hardcopy is also called a ____
answer
printout
question
The process of locating and correcting syntax and logic errors in a program is known as ____ the program.
answer
debugging
question
People connect wirelessly to the internet through a ____ using their mobile devices
answer
hot spot
question
On larger computers, tape cartridges are mounted in a separate cabinet called a tape ______
answer
library
question
A certificate ____ is an authorized person or company that issues and verifies digital certificates.
answer
Authority
question
The 1988 ____ regulates the use of government data to determine the eligibility of individuals for federal benefits.
answer
Computer Matching and Privacy Protection Act
question
A ____ line is a type of always-on connection that is established between two communications devices.
answer
dedicated
question
A major weakness of a lot of file processing systems is that they ____.
answer
have redundant data and isolate data
question
A(n) ____ modem sends and receives data and information to and from a digital line.
answer
digital
question
A wireless ____ point is a central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
answer
access
question
Windows ___ is Microsofts fastest, most efficient operating system to date
answer
7
question
An IT code of conduct is a written guideline that helps determine whether a specific computer action is ______.
answer
ethical
question
A ____ overcomes the major disadvantage of CD-R disks, which is being able to write on them only once.
answer
CDRW
question
Often users ____, or transfer a copy of, the images from a digital camera to a computer's hard disk.
answer
download
question
A typical enterprise consists of hundreds of operating entities, called ____ including departments, centers, and divisions.
answer
functional units
question
Some cloud storage services charge an additional per ____ fee for data transferred to and from the cloud storage service.
answer
gigabyte
question
A(n) ____ is the intersection of a column and row in a worksheet.
answer
call
question
____ are two of the more widely accessed Internet services.
answer
WWW and email
question
An image ____ is a graphical image that points to one or more Web addresses.
answer
map
question
A unit test ____.
answer
verifies that each individual program works by itself
question
A(n) ____ is a display device that is packaged as a separate peripheral.
answer
monitor
question
____ enables users to speak to other users over the Internet.
answer
VoIP
question
A network ____ refers to the layout of the computers and devices in a communications network.
answer
topology
question
____ means the operating system automatically configures new devices as users install them.
answer
Plug and Play
question
A(n) ____ tests a condition at the beginning of the loop and repeats one or more times as long as the condition is true.
answer
do-while control structure
question
A(n) ____ interface controls how users enter data and instructions into a computer and how information is displayed on the screen.
answer
interface
question
A(n) ____ is a window on the screen that provides areas for entering or changing data in a database.
answer
form
question
A tape ____ is a small, rectangular, plastic housing for tape.
answer
cartridge
question
A(n) ____ performs calculations on the data in a worksheet and displays the resulting value in a cell.
answer
formula
question
A(n) ____ utility assists programmers with identifying syntax errors and finding logic errors in a program.
answer
debug
question
A(n) ____ display is a lightweight display device with a shallow depth, such as an LCD monitor or plasma monitor, that does not use CRT technology.
answer
flat panel
question
____ is a magnetically coated ribbon of plastic capable of storing large amounts of data and information at a low cost.
answer
Tape
question
Sometimes a company uses a(n) ____, which allows customers or suppliers to access part of its intranet.
answer
extranet
question
A(n) ____ hard disk is a hard disk that you insert and take out of a drive, and it may either be built into the system unit or external and connected via a USB or FireWire port.
answer
removable
question
____ are employees who are responsible for coordinating and controlling an organization's resources.
answer
Managers
question
The kernel is memory ____, which means it remains in memory while the computer is running.
answer
resident
question
Linux is ____ software, which means its code is provided for use, modification, and redistribution.
answer
open source
question
The USB (universal serial bus) and FireWire bus are ____.
answer
buses that eliminate the need to install cards in expansion slots
question
A card ____ is a device that reads data, instructions, and information stored on flash memory cards.
answer
reader/writer
question
To prevent repetitive strain injury, take all of the following precautions except ____.
answer
use heel of hand as pivot point
question
____, which provides encryption of all data that passes between a client and an Internet server, requires only that the client has a digital certificate.
answer
Transport Layer Security TLS
question
A(n) ____ viewer is a utility that allows users to display, copy, and print the contents of a graphics file.
answer
image
question
A(n) ____ is a touch-sensitive display device that users interact with by touching the screen with a finger.
answer
touch screen
question
A(n) ____ suppressor uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching a computer and other electronic equipment.
answer
surge suppressor
question
In sequence, most SYStem development life cycles contain five phases: ____.
answer
planning analysis design implementation support
question
A(n) ____ database is an application appropriate for an object-oriented database that contains text, graphics, video, and sound.
answer
hypermedia
question
In the ____ phase, system developers perform four major activities: (1) develop programs, (2) install and test the new system, (3) train users, and (4) convert to the new system.
answer
implementation
question
With ____, the processor begins fetching a second instruction before it completes the machine cycle for the first instruction.
answer
pipelining
question
____ privileges for data involve establishing who can enter new data, change existing data, delete unwanted data, and view data.
answer
Access
question
____ cable consists of one or more twisted-pair wires bundled together.
answer
Twisted pair
question
____ is the process of dividing a disk into tracks and sectors, so the operating system can store and locate data and information on the disk.
answer
Formatting
question
Data ____ identifies the quality of data in a database.
answer
integrity
question
A processor contains small high-speed storage locations, called ____, that temporarily hold data and instructions.
answer
registers
question
Project leaders can use project ____ software to assist them in planning, scheduling, and controlling development projects.
answer
management
question
____ is the process by which an enterprise collects, archives, indexes, and retrieves its knowledge or resources.
answer
KM (Knowledge management)
question
A command is ____.
answer
an instruction that causes a program to perform a specific action
question
In Windows, the ____ contains a list of programs that open automatically when users boot the computer.
answer
startup folder
question
The processor relies on a small quartz crystal circuit called the ____ clock to control the timing of all computer operations.
answer
system clock
question
____ report usually list just transactions.
answer
detailed
question
____ is/are not considered spyware because a user knows it/they exist(s).
answer
cookies
question
One popular use of ____ is to store a prepaid amount of money, such as for student purchases on campus.
answer
smart cards
question
Some ____ printers spray ink, while others use heat or pressure to create images.
answer
nonimpact
question
____ systems provide forecasting for inventory control, manage and track shipping of products, and provide information and analysis on inventory in warehouses.
answer
distribution
question
The amount of data, instructions, and information that can travel over a communications channel sometimes is called the ____.
answer
bandwidth
question
The area of the hard disk used for virtual memory is called a(n) ____ file because it exchanges data, information, and instructions between memory and storage.
answer
swap file
question
The case of the system unit, sometimes called the ____, is made of metal or plastic and protects the internal electronic components from damage.
answer
chassis
question
A(n) ____ is a utility that removes a program, as well as any associated entries in the system files.
answer
uninstaller
question
A(n) ____ card, which is similar in size to a credit card or ATM card, stores data on a thin microprocessor embedded in the card.
answer
smart
question
The ____ enables a program to perform one or more actions repeatedly as a loop as long as a certain condition is met.
answer
repetition
question
A(n) ____ gives authors and artists the exclusive rights to duplicate, publish, and sell their materials.
answer
copyright
question
Types of wired home networks include all of the following EXCEPT ____.
answer
Wi Fi (Ethernet, powerline, phoneline)
question
A ____ port was formerly referred to as an IEEE 1394 port.
answer
FireWire
question
A momentary overvoltage, called a ____, occurs when the increase in power lasts for less than one millisecond (one thousandth of a second).
answer
spike
question
A(n) ____ is an information system that enables employees to perform tasks using computers and other electronic devices, instead of manually.
answer
OIS (operational info system)
question
The speed of a dot-matrix printer is measured by the number of ____ it can print.
answer
characters per second (cps)
question
A personal ____ is a utility program that detects and protects a personal computer and its data from unauthorized access.
answer
firewall
question
One purpose of using test data is to try to cause a ____, which is an error that causes a program to stop running.
answer
run-time error
question
A(n) ____ is an output device that visually conveys text, graphics, and video information.
answer
display
question
Some computers improve hard disk access time by using a disk ____, which consists of memory chips that store frequently accessed items.
answer
cache
question
Together, the four basic operations of a processor (fetching, decoding, executing, and storing) comprise a(n) ____ cycle.
answer
machine
question
____ a program involves translating the solution algorithm into a programming language (usually on paper) and then typing the programming language code into the computer.
answer
coding
question
With a three-generation backup policy, the parent is the ____.
answer
second oldest copy
question
____ is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct expected of individuals while online.
answer
netiquette
question
Programs that analyze data, such as those in a DSS (decision support system), sometimes are called ____ programs.
answer
OLAP (online analytical processing)
question
Leading, sometimes referred to as directing, is an activity performed by managers that involves ____.
answer
instructing and authorizing others to perform the necessary work
question
All of the following are characteristics of hard disks EXCEPT ____.
answer
write-protect notch (read/write head, sectors and tracks, capacity)
question
Dead code is _____.
answer
any program instructions that a program never executes
question
A(n) ____ is an information system that helps users analyze data and make decisions.
answer
DSS
question
____ is the most common type of volatile memory.
answer
RAM
question
A(n) ____ information system is a system that serves as a central repository for the tasks of the marketing functional unit.
answer
marketing
question
The ____ follows these six steps: (1) analyze the requirements, (2) design the solution, (3) validate the design, (4) implement the design, (5) test the solution, and (6) document the solution.
answer
program development life cycle
question
____ is the application of human intelligence to computers.
answer
AI (artificial intelligence)
question
An ERM system ______.
answer
facilitates communication between employees and the business
question
A(n) ____ drive like that in the accompanying figure fits into a port that is itself an interface that can connect up to 127 different peripherals together with a single connector.
answer
USB
question
____ devices are servers connected to a network with the sole purpose of providing storage.
answer
NAS (network area storage)
question
Windows ____ is an operating system that includes functionality, applications, and a user interface designed for specific types of smart phones.
answer
Phone 7
question
A(n) ____ is a collection of every action that users make as they move through a Web site.
answer
click stream
question
A form that sends entered data across a network or the Internet is called a(n) ____.
answer
e-form
question
The latest version of the Macintosh operating system, Mac ____, is a multitasking operating system available only for computers manufactured by Apple.
answer
OS X
question
A single user/single ____ operating system allows only one user to run one program at a time.
answer
tasking
question
____ clients are small, terminal-like computers that mostly rely on a server for data storage and processing.
answer
thin
question
One of the more common causes of ____ is an electrical power variation.
answer
system failure
question
A USB ____ is a device that plugs in a USB port on the system unit like the one in the accompanying figure and contains multiple USB ports in which users plug cables from USB devices.
answer
hub
question
Many people initially referred to the functions of a TPS (transaction processing system) as ____.
answer
data processing
question
The purpose of memory ____ is to optimize the use of random access memory (RAM).
answer
management
question
A(n) ____ identifies data outside of a normal condition.
answer
exception report
question
Fiber-optic cables have all of the following advantages over cables that use wire except ____.
answer
lower costs and easier installation/modification (faster data transmission and smaller size, less susceptible to noise, better security for signals)
question
Windows ____ is a scaled-down Windows operating system designed for use on communications, entertainment, and computing devices with limited functionality.
answer
Embedded CE
question
Windows ____ is a scaled-down Windows operating system designed for use on communications, entertainment, and computing devices with limited functionality.
answer
FTP (File transfer protocol)
question
Web sites use a ____ to keep track of items in a user's shopping cart.
answer
session cookie
question
A file is _________.
answer
a named collection of stored data, instructions, or info
question
During a cold boot on a personal computer, the POST (power-on self test) results are compared with data in a ____ chip.
answer
CMOS (complementary metal oxide semiconductor)
question
An enterprise storage system may use ____.
answer
RAID and a tape player, optical disc jukeboxes, Internet backup and NAS devices
question
An FTP ____ is a computer that allows users to upload and/or download files using FTP.
answer
server
question
A(n) ____ operating system is an operating system that organizes and coordinates how multiple users access and share resources on a network.
answer
server
question
An operational manager makes a(n) ____ decision, which is a decision that involves day-to-day activities within a company.
answer
operational
question
A disaster ____ plan is a written plan describing the steps a company would take to restore computer operations in the event of a disaster.
answer
recovery
question
A(n) ____ is a window that provides information, presents available options, or requests a response.
answer
dialog box
question
All of the following use direct access EXCEPT ____.
answer
tape (CDs, DVDs, Hard disks)
question
Instead of using CD-R, many users opt for ____, which is an erasable multisession disc users can write on multiple times.
answer
CD-RW
question
____ is the number of bytes (characters) a storage medium can hold.
answer
capacity
question
Digital forensics is used by ____.
answer
military intelligence, insurance agencies, law enforcement
question
____ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system breaches.
answer
intrusion
question
A cross-platform program is one that runs ____.
answer
the same on multiple operating systems
question
A(n) ____ flash memory card has a storage capacity of 512 MB to 8 GB.
answer
Secure Digital
question
A(n) ____ is a small metal or plastic device that looks like a tiny ink pen but uses pressure instead of ink.
answer
stylus
question
A(n) ____ occurs when the incoming electrical power increases significantly above the normal 120 volts.
answer
overvoltage
question
One type of spyware, called a(n) ____, is hidden on Web pages or in e-mail messages in the form of graphical images.
answer
Web bug
question
Users can purchase a software program that selectively ____ cookies.
answer
blocks
question
A _____ is a series of instructions that tells a computer what to do and how to do it.
answer
program
question
____ is a conversation that takes place over the Internet using a telephone connected to a computer, mobile device, or telephone adapter.
answer
VoIP
question
____, which allows users to choose an encryption scheme that passes between a client and a server, requires that both the client and server have digital certificates.
answer
Secure HTTP
question
Many scanners include ____ software, which can read and convert text documents into electronic files.
answer
OCR
question
With ____, the broadcast signals are digitized when they are sent via over-the-air broadcasts from local television networks, satellite, or cable.
answer
HDTV
question
A(n) ____ is a small, flat, rectangular pointing device that is sensitive to pressure and motion.
answer
touchpad
question
A(n) ____ copies the files that have changed since the last full backup or last incremental backup.
answer
incremental
question
____ allows users to pay bills from their computer, that is, transfer money electronically from their account to a payee's account such as the electric company or telephone company.
answer
online banking
question
A(n) ____ is a high-speed network with the sole purpose of providing storage to other servers to which it is attached.
answer
SAN (storage attached network)
question
With a three-generation backup policy, the grandparent is the ____.
answer
oldest copy of the file
question
Novell's ____ is a server operating system designed for client/server networks.
answer
NetWare
question
____ is any data and instructions entered into the memory of a computer.
answer
input
question
During ____, a systems analyst builds upon the data dictionary developed during the analysis phase.
answer
database design
question
According to netiquette, Internet users should assume ____.
answer
the use of all capital letters is the equivalent of shouting
question
Audio ____ is the process of entering any sound into the computer such as speech, music, and sound effects.
answer
input
question
The components of a domain name are separated by ____.
answer
periods
question
A(n) ____ operating system supports two or more processors running programs at the same time.
answer
multiprocessing
question
High-availability systems often include a feature called ____, which allows components, such as a RAID hard disk or power supplies, to be replaced while the rest of the system continues to perform its tasks.
answer
hot-swapping
question
A ____ is a device that provides a central point for cables in a network.
answer
hub
question
____ is a technology that provides high-speed Internet connection using regular copper telephone lines.
answer
DSL
question
FTP sites can be ____, whereby anyone can transfer some, if not all, available files.
answer
anonymous
question
A group of two or more integrated hard disks is called a(n) ____.
answer
RAID
question
Smart phones and other small computing devices often use a ____ operating system.
answer
single user/single tasking
question
A(n) ____ circuit, which is etched on a computer chip, contains many microscopic pathways capable of carrying electrical current.
answer
integrated
question
A(n) ____ is an identification code that consists of a set of vertical lines and spaces of different widths.
answer
barcode
question
A(n) ____ device is any hardware component that conveys information to one or more people.
answer
output
question
____ means in a location separate from the computer site.
answer
offsite
question
____ is the technology of authenticating a person's identity by verifying a personal characteristic.
answer
biometrics
question
Personal computers, display devices, and printers should comply with guidelines of the ____ program.
answer
energy star
question
For smaller business and home networks, a ____ allows multiple computers to share a single high-speed Internet connection such as through a cable modem or DSL modem.
answer
router
question
Networks, servers, mainframes, and supercomputers allow hundreds to thousands of users to connect at the same time, and thus are ____.
answer
multiuser
question
____ software, such as operating systems and utility programs, consists of the programs that control or maintain the operations of a computer and its devices.
answer
system
question
Middle managers make ____ decisions, which are short-range decisions that apply the specific programs and plans necessary to meet stated objectives.
answer
tactical
question
Common types of flash memory cards include ____.
answer
CompactFlash, Secure Digital and Memory Stick, xD Picture Card
question
A(n) ____ operating system enables two or more users to run programs simultaneously.
answer
multiuser
question
Controlling is an activity performed by managers that involves ____.
answer
measuring performance and if necessary, taking corrective action
question
Executive managers primarily are responsible for ____ decisions, which are decisions that center on a company's overall goals and objectives.
answer
strategic
question
A(n) ____, such as a keyboard or printer, is a device that connects to the system unit and is controlled by the processor in the computer.
answer
peripheral
question
General purpose, or ____ systems cross the boundaries of functional units and are used by one or more functional units in an enterprise.
answer
enterprise-wide
question
Compressed files, sometimes called ____.
answer
zipped files
question
____, such as POS terminals and automated teller machines, perform specific tasks and contain features uniquely designed for use in a particular industry.
answer
special purpose terminals
question
The operating system that a computer uses sometimes is called the ____.
answer
platform
question
____, such as accountants, engineers, and other professionals, include individuals whose jobs center on the collection, processing, and application of information.
answer
knowledge workers
question
The purpose of the system ____ is to assess the feasibility of each alternative solution and then recommend the most feasible solution for a project.
answer
proposal
question
____ is a multitasking operating system developed in the early 1970s by scientists at Bell Laboratories.
answer
UNIX
question
____ servers pack a complete computer server, such as a Web server or network server, on a single card.
answer
blade
question
____ is the most advanced form of digital television.
answer
HDTV
question
A ____ is an instruction, or set of instructions, a user follows to accomplish an activity.
answer
procedure
question
In a disaster recovery plan, the recovery plan specifies ____.
answer
the actions to be taken to restore full information processing operations
question
____ software is privately owned software and limited to a specific vendor or computer model.
answer
proprietary
question
A(n) ____ computer is a computer that continues to operate when one of its components fails, ensuring that no data is lost.
answer
fault-tolerant
question
Users are turning to ____ for crisper, higher-quality output than they can achieve with analog television.
answer
DTV
question
Users may have ____ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image.
answer
CVS (comp vision syndrome)
question
____ radio is a wireless transmission medium that distributes radio signals through the air over long distances.
answer
broadcast
question
A virus ____ is an e-mail message that warns users of a nonexistent virus, worm, or Trojan horse.
answer
hoax
question
____ refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos.
answer
IP (internet protocol)
question
____ is a special formatting language that programmers use to format documents for display on the Web.
answer
HTML
question
With a ____, users interact with menus and visual images such as icons, buttons, and other objects to issue commands.
answer
graphical user interface (GUI)
question
Commonly used nonimpact printers include all of the following EXCEPT ____.
answer
inkjet printers, photo printers, laser printers, thermal printers, mobile, printers, label and postage printers (EXCEPT line printers and dot matrix printers)
question
____ storage is the physical material on which a computer keeps data, instructions, and information.
answer
secondary
question
If a hard disk is damaged, a computer can be booted from a(n) ____ disk, which is usually a CD that contains a few system files that will start the computer.
answer
recovery
question
A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
answer
RSI (repetitive strain injury)
question
The purpose of the ____ phase is to construct, or build, a new or modified system and then deliver it to the users.
answer
implentation
question
Organizations implement ____ to assist in the task of knowledge management.
answer
KMS (knowledge management system)
question
A(n) ____ flash memory card has a storage capacity of 1 GB to 16 GB.
answer
Memory Stick PRO Duo
question
Organizing is an activity performed by managers that includes ____.
answer
identifying and combining resources so that company can reach goals and objectives
question
Uptime is a measure of ____.
answer
availability
question
____ computing combines many servers and/or personal computers on a network to act as one large computer.
answer
grid
question
Although it is an inexpensive way for users to connect to the Internet, ____ is slower-speed technology.
answer
dial up connection
question
A(n) ____ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.
answer
UPS uninterruptible power supply
question
A storage technique that a DVD-ROM can use to achieve a higher storage capacity than a CD-ROM is to ____.
answer
make disc denser by packing pits closer, use two layers of pits, be double sided
question
____ is a technology that involves reading typewritten, computer-printed, or hand-printed characters from ordinary documents and translating the images into a form that the computer can process.
answer
OCR (optical character recognition)
question
____ services include a relatively new set of software technologies that allows businesses to create products and B2B (business-to-business) interactions over the Internet.
answer
web
question
A(n) ____ operating system is a complete operating system that works on a desktop computer, notebook computer, or mobile computing device.
answer
stand alone
question
A(n) ____ system is a set of programs containing instructions that coordinate all the activities among computer hardware resources.
answer
operating
question
A competing operating system to Windows Phone is Palm ____, which runs on Palm-powered PDAs and smart phones.
answer
OS
question
When using spreadsheet software, the rows and columns collectively are called a(n) ____.
answer
worksheet
question
In a disaster recovery plan, the backup plan specifies ____.
answer
how a company uses backup files and equipment to resume information processing
question
A(n) ____ is a defined process that identifies the specific set of steps involved in completing a particular project or business process.
answer
workflow
question
Each tick of the system clock equates to a ____.
answer
clock cycle
question
With Windows, a warm boot can be performed by ____.
answer
clicking a button on the task bar, then a Start menu button, then a Lock menu button
question
A(n) ____ consolidates data usually with totals, tables, or graphs, so managers can review it quickly and easily.
answer
summary report
question
Voice ____ is the process of entering data by speaking into a microphone.
answer
input
question
A file server is a dedicated server that ____.
answer
stores and manages files
question
With a three-generation backup policy, the child is the ____.
answer
most recent copy of the file
question
Comparable to a tape recorder, a tape ____ reads and writes data and information on a tape.
answer
drive
question
The ____ is firmware that contains a computer's startup instructions.
answer
BIOS
question
Many worksheet cells contain a number that can be used in a calculation, called a(n) ____.
answer
value
question
____ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer.
answer
noise
question
The communications device that connects a communications channel to a sending or receiving device such as a computer is a(n) ____.
answer
modem
question
A(n) ____ certificate is a notice that guarantees a user or Web site is legitimate.
answer
digital
question
The ____ is the component of the processor that performs arithmetic, comparison, and other operations.
answer
ALU (arithmetic logic unit)
question
A(n) ____ copies only the files that have changed since the full backup.
answer
differential backup
question
A(n) ____, sometimes called an archival backup, copies all of the files in a computer.
answer
full backup
question
The overall technology strategy often is referred to as the information ____ of a company.
answer
architecture
question
The data ____ stores a data item's name, description, and other details about each data item.
answer
dictionary
question
A(n) ____ is made of aluminum, glass, or ceramic and is coated with an alloy material that allows items to be recorded magnetically on its surface.
answer
platter
question
____ uses a condensed form of English to convey program logic.
answer
pseudocode
question
In sequence, the program development life cycle consists of six steps: ____.
answer
analyze requirements, design solution, validate design, implement design, test solution, and document solution
question
The ____ phase consists of two major activities: (1) if necessary, acquire hardware and software and (2) develop all of the details of the new or modified information system.
answer
design
question
____ is a measure of how suitable the development of a system will be to a company.
answer
feasibility
question
A(n) ____ card is a removable device that allows users to transfer data and information conveniently from mobile devices to their desktop computers.
answer
memory
question
A ____ is a numeric password either assigned by a company or selected by a user.
answer
pin
question
Most ____ devices include a small optical scanner for reading characters and sophisticated software to analyze what is read.
answer
OCR
question
A(n) ____ modem is a digital modem that sends and receives digital data over the cable television (CATV) network.
answer
broadband
question
A NAS (network attached storage) server often is called a storage ____ because it is a piece of equipment with only one function โ to provide additional storage.
answer
appliance
question
The power ____ is the component of the system unit that converts the wall outlet AC power into the DC power a computer requires.
answer
supply
question
Naval officer ____, a pioneer in computer programming, was a prime developer of COBOL.
answer
Grace Hopper
question
____ is the practice of sharing or pooling computing resources, such as servers and storage devices.
answer
virtualization
question
With ____ multitasking, the operating system interrupts a program that is executing and passes control to another program waiting to be executed.
answer
preemptive
question
The ____ unit is the component of the processor that directs and coordinates most of the operations in the computer.
answer
control
question
The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.
answer
electronic communications privacy act
question
A pop-up ____ is a filtering program that stops pop-up ads from displaying on Web pages.
answer
blocker
question
A(n) ____ has the same intent as a cracker, but does not have the technical skills and knowledge.
answer
script kiddie
question
The ____ unit is a case that contains electronic components of the computer used to process data.
answer
system
question
A particularly devastating type of DoS attack is the ____ DoS attack, in which multiple unsuspecting computers are used to attack multiple computer networks.
answer
distributed
American National Standards Institute
Computer Networks
Digital Subscriber Line
Fiber Optic Cables
Network Security
Network Technology
Twisted Pair Cable
Info 160 Exam – Flashcards 97 terms

Darren Farr
97 terms
Preview
Info 160 Exam – Flashcards
question
The connectivity port that uses a standard phone line connection is the modem port.
answer
True
question
Computer systems run at speeds measured in gigahertz.
answer
True
question
Processing is manipulating, calculating, or organizing data into information.
answer
True
question
The central processing unit controls all the functions performed by the computer's other components and processes all the commands issued to it by software instructions.
answer
True
question
________ is the applied science concerned with designing and arranging machines and furniture so that the people using them aren't subjected to an uncomfortable or unsafe experience.
answer
Ergonomics
question
A(n) ________ is a specially designed computer that can perform complex calculations extremely fast.
answer
supercomputer
question
Mainframes are used in situations where complex models requiring intensive mathematical calculations are needed.
answer
False
question
All of the following are names for a flash drive, EXCEPT ________. USB Drive Jump Drive Hard Drive Thumb Drive
answer
Hard Drive
question
RAM is a ________ storage location.
answer
volatile
question
Inkjet printers and laser printers are examples of ________ printers.
answer
nonimpact
question
New technologies pushing the boundaries of printing include ________.
answer
Inkless Printing
question
________ are shortcut keys that you press to perform special tasks; each software application has its own set of tasks assigned to these keys.
answer
Function Keys
question
Data and information are terms that can be used interchangeably
answer
False
question
The four functions of the computer include input, process, output, and ________.
answer
Storage
question
________ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.
answer
Embedded
question
Which of the following is the largest unit of measure for the size of a computer file?
answer
Petabyte
question
A(n) ________ is an input device that looks like a pen.
answer
Stylus
question
Modern printers feature Bluetooth connectivity technology.
answer
true
question
Podcasts enable you to ________.
answer
deliver audio/video files via RSS.
question
________ use(s) continuous audio and video feeds.
answer
Webcasts
question
The concept of the Internet was developed in response to the ________ War.
answer
Cold
question
Software that enables you to display and interact with text and other media on the Web is a ________.
answer
web browser
question
Wikipedia is a good source for a research paper.
answer
False
question
In the URL http://www.pearsonhighered.com/techinaction, the portion labeled ".com" is the ________.
answer
top-level domain
question
The Internet is the largest computer network in the world.
answer
True
question
All of the following are a type of e-commerce business, EXCEPT ________. C2B B2C C2C B2B
answer
C2B
question
Web 2.0 is classified as the ________.
answer
Social Web
question
When evaluating a Web site, testing the relevancy of a site means checking to see whether the information in the site is current.
answer
True
question
There are virtually no privacy risks in using today's newest social networking sites.
answer
False
question
A ________ is a personal journal posted on the Web.
answer
blog
question
A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as a(n) ________.
answer
breadcrumb trail
question
In the URL http://www.pearsonhighered.com/techinaction, the portion labeled "http" is the ________.
answer
protocol
question
E-mails are completely private.
answer
False
question
Multimedia software includes all of the following, EXCEPT ________.
answer
Utility Software
question
The type of software that is best used to create a simple budget is ________.
answer
spreadsheet software
question
A(n) ________ software installation enables you to decide which features you want to install on the hard drive.
answer
custom
question
System software does all of the following, EXCEPT ________. -coordinate instructions between application software and the computer's hardware devices -add graphics and pictures to files -help run the computer -help manage system resources
answer
Add graphics and pictures to files
question
QuickBooks and Peachtree are examples of ________ software.
answer
accounting
question
Another way to obtain software is through ________, where a vendor hosts the software online over the Internet and you do not have to install it on your computer.
answer
open source as a service
question
Moodle and Blackboard are examples of ________.
answer
course management software
question
______ software is the software that helps run the computer and coordinate instructions between the computer and the hardware devices.
answer
System
question
The type of software that is free and available with few licensing and copyright restrictions is known as ________ software.
answer
open source
question
In a spreadsheet, equations that use addition, subtraction, multiplication, and division operators, as well as values and cell references are called ________.
answer
...
question
The appropriate software to use for creating research papers is ________.
answer
word processing software
question
The general software you use to do tasks at home, school, or work is known as ________ software.
answer
application
question
Adobe Photoshop and Corel PaintShop Photo Pro are examples of ________ software.
answer
image-editing
question
All of the following are examples of software suites, EXCEPT ________. -Microsoft Office 2010 -Apple iWork -Apache OpenOffice -Microsoft OneNote
answer
Microsoft OneNote
question
Web-based application software is software that ________.
answer
is stored completely on a Web server instead of your hard drive
question
In databases, information is organized in ________.
answer
tables, records, and fields
question
Software as a Service (SaaS) is a Web-based application.
answer
True
question
A wizard is a systematic guide that walks you through the steps necessary to complete a complicated task.
answer
True
question
The most common compressed digital format is MP3.
answer
True
question
OpenOffice.org is an example of open source software.
answer
True
question
Desktop publishing software enables you to create newsletters and annual reports.
answer
True
question
One of the new capabilities of PowerPoint 2010 enables you to trim video clips without a separate video-editing program.
answer
True
question
Application software helps run the computer and coordinates instructions.
answer
False
question
Microsoft's spreadsheet software is called Calc.
answer
False
question
The location of a file is specified by its ________.
answer
file path
question
C:DocumentsSpring 2012CIS 101Term PaperComputer Technology is an example of a ________.
answer
file path
question
Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS.
answer
device driver
question
Which utility takes out redundancies in a file to reduce the file size?
answer
File Compression
question
The process of optimizing RAM storage by borrowing hard drive space is called ________.
answer
virtual memory
question
Mac OS X includes a backup utility called ________.
answer
Time Machine
question
Windows 8 is the operating system developed by ________.
answer
Microsoft
question
A(n) ________ is a small program that performs general housekeeping tasks for your computer.
answer
utility program
question
Which of the following was the first widely used operating system installed in personal computers?
answer
MS-DOS
question
The most essential software in your computer system is the ________.
answer
operating system
question
Which of the following is an open source operating system for personal computers?
answer
Linux
question
The ________ is(are) the group of programs that controls how your computer functions.
answer
user interface
question
Errors in computer software are called ________.
answer
bugs
question
If Microsoft Word 2010 is used to create a file, which file extension is added automatically?
answer
.docx
question
The OS enables you to organize the contents of your computer in a hierarchical structure of ________.
answer
...
question
You can use the Windows ________ to check on a nonresponsive program.
answer
Task Manager
question
Match the following terms to their meanings: 1.Task Manager 2.System Restore 3.Disk Cleanup 4.Disk Defragmenter 5.Error-Checking
answer
1.lists all the programs being used and indicated their status. 2.brings system back to a previously stable state. 3.removes unnecessary files from the hard drive. 4.regroups related pieces of files on the hard disk. 5.checks the hard drive for damaged files.
question
Match the following terms to their meanings: 1.open source 2.source code 3.Mac OS 4.platform 5.Windows 8
answer
1.a program that is freely available for developers. 2.lines of instructional computer code 3.Apple operating system 4.combination of processor and operating system. 5.the newest Microsoft OS
question
A ________ is a virus that is triggered on a certain date.
answer
time bomb
question
With regard to computer protection, quarantining is defined as ________.
answer
placing a found virus in a secure area on the hard drive
question
Rules for creating passwords include all of the following, EXCEPT ________. -keep your password a secret -create a hard-to-guess password, with a combination of letters, numbers, and symbols -keep your password written down and stored in any easy-to-remember location -change your password frequently
answer
keep your password written down and stored in any easy-to-remember location
question
Adware and spyware are referred to collectively as ________.
answer
grayware
question
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
answer
DDoS attack
question
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
answer
Virus signature
question
Which of the following statements about cookies is NOT true? -Some companies sell the personal information found in cookies to other companies. -Cookies are text files. -Cookies help companies determine the traffic flow through their Web site. -Cookies obtain your personal information by searching your hard drive.
answer
Cookies obtain your personal information by searching your hard drive.
question
All of the following are the main functions of antivirus software, EXCEPT ________. -inoculating key files -looking for virus signatures -quarantining viruses -assassinating all viruses
answer
assassinating all viruses
question
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
answer
White-hat
question
A ________ is a virus that is attached to documents such as Word or Excel files.
answer
macro virus
question
Antivirus software will stop all viruses.
answer
False
question
A worm infects a host file and waits for that file to be executed on another computer to replicate.
answer
False
question
A denial-of-service attack can be used to deny hackers access to a computer system.
answer
False
question
The terms "virus" and "worm" actually mean the same thing.
answer
False
question
Identity theft does NOT cause financial harm to individuals.
answer
False
question
A virus signature is a portion of virus code that is unique to a particular computer virus.
answer
True
question
A time bomb is a virus that is triggered when certain conditions are met such as opening a file.
answer
False
question
Match the following terms to their meaning: 1.CPU 2.RAM 3.ROM 4.LCD 5.QWERTY
answer
1. processes all commands issued by software instructions 2. stores programs and data the computer is currently using 3. holds instructions needed to start up when the computer is powered on 4. type of technology used on flat-screen monitors 5. standard keyboard layout
question
Match the following terms to their definition: 1.WWW 2.browser 3.e-mail 4.Internet 5.search engine
answer
1. the means of accessing information over the Internet 2. an application program used to view the Web 3. electronic communication 4. a large network of networks 5. a tool used to locate information on the Web
question
Match the following terms to their definitions: 1. worm 2. computer virus 3. encryption virus 4. polymorphic virus
answer
1. Attempts to travel between systems through network connections to spread an infection 2. A program that renders your computer files unusable by compressing them 3. A program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files 4. A virus that changes its own code to avoid detection
question
Match the following terms to their definitions: 1.grey-hat hacker 2.black-hat hacker 3.phishing 4.social engineering 5.white-hat hacker
answer
1. flaunts expertise to the administrator of a system 2. An unethical hacker 3. sending an e-mail containing false information to obtain personal information 4. techniques used to manipulate people into performing actions or divulging confidential information 5. an "ethical" hacker
question
What is the free antivirus software available to all VCU students?
answer
Sophos
Cisco
Data Link Layer
Destination Mac Address
Digital Subscriber Line
Fault Tolerance
Fiber Optic Cable
Internet Service Providers
NTEN 123 – IoE – Flashcards 42 terms

Stephanie Landry
42 terms
Preview
NTEN 123 – IoE – Flashcards
question
Ch. 1 Which statement describes a characteristic of a converged network? a. The network establishes separate communication channels for each network service. b. Network services are delivered over a wide range of network platforms. c. The network uses different technologies for voice, video, and data. d. A single network that delivers voice, video, and data to a variety of devices.
answer
d. A single network that delivers voice, video, and data to a variety of devices.
question
Ch. 1 What is the IoE? a. It is another term for the Internet. b. It is a high-speed global cellular service that quickly connects people anywhere in the world. c. It is an interconnection between people, data, process, and things to provide value. d. It is an application for connecting and configuring sensors. e. It is a security protocol for social media.
answer
c. It is an interconnection between people, data, process, and things to provide value.
question
Ch. 1 Fill in the blank. The _______ pillar of the IoE focuses on the interactions between the other three pillars so that information is provided to the right place at the appropriate time.
answer
process
question
Ch. 1 What are two functions of intermediary devices on a network? (Choose two.) A. They direct data along alternate pathways when there is a link failure. B. They are the primary source and providers of information and services to end devices. C. They run applications that support collaboration for business. D. They filter the flow of data, based on security settings. E. They form the interface between the human network and the underlying communication network.
answer
A. They direct data along alternate pathways when there is a link failure. D. They filter the flow of data, based on security settings.
question
Ch. 1 List four items that will potentially disappear from daily use within the next 25 years because of technological advancements.
answer
telephone booths video rental stores watches stamps wallets checks newspapers books telephone landlines telephone poles
question
Ch. 1 What two criteria are used to help select a network medium from various network media? (Choose two.) A. the number of intermediary devices installed in the network B. the distance the selected medium can successfully carry a signal C. the types of data that need to be prioritized D. the cost of the end devices utilized in the network E. the environment where the selected medium is to be installed
answer
B. the distance the selected medium can successfully carry a signal E. the environment where the selected medium is to be installed
question
Ch. 1 How many "things" are predicted to be interconnected on the Internet by 2020? A. 1 billion B. 5 million C. 1 million D. 50 billion
answer
D. 50 billion
question
Ch. 1 Match the core priorities of an organization to examples of the value of using the IoE. A) asset utilization B) customer experience C) supply chain D) innovation E) employee productivity i) improving customer relationships and garnering more of the market ii) reducing time to market products and improving product development to meet customer needs iii) providing processes and an environment to improve productivity and scalability iv) lower costs v) identify areas of waste and delays, while increasing logistic efficiency
answer
A) asset utilization = iv) lower costs B) customer experience = i) improving customer relationships and garnering more of the market C) supply chain = v) identify areas of waste and delays, while increasing logistic efficiency D) innovation = ii) reducing time to market products and improving product development to meet customer needs E) employee productivity = iii) providing processes and an environment to improve productivity and scalability
question
Ch. 1 What is the Internet? A) the type of physical media used by computers to access the Word Wide Web B) a small isolated internal network of a company C) a network of networks D) an application used to access the World Wide Web
answer
question
Ch. 1 What describes the Networked Economy phase of Internet development? A) It provided connections that allowed web browsing and email at limited speeds. B) It involved transitioning everything to the Internet. C) It is dominated by social media and connecting mobile devices. D) It is considered the birth of e-commerce.
answer
D) It is considered the birth of e-commerce.
question
Ch. 1 True or False? A company that uses customer feedback posted on the Internet to guide the revision of support policies is an example of a company being agile.
answer
True
question
Ch. 3 Why is Cloud computing necessary for the management of data in the Internet of Everything? A) It provides security for applications by hiding them in a Cloud. B) It provides applications and services distributed over the globe. C) It provides support for latency-sensitive applications. D) It provides a new secure and transparent programming language to create applications.
answer
B) It provides applications and services distributed over the globe.
question
Ch. 3 What is an example of a computer program that could be coded with the JavaScript scripting language? A) a mortgage monthly payment calculator on a web page B) Microsoft Word C) a game on an iPad D) the system software on an Android cell phone
answer
A) a mortgage monthly payment calculator on a web page
question
Ch. 3 Which network device maintains information on where to forward data packets to reach remote destinations? A) aggregator B) router C) controller D) actuator
answer
B) router
question
Ch. 3 Which three 802.15 protocols must forward information to an IP-enabled device to communicate on the Internet? (Choose three.) a) ZigBee b) Bluetooth c) NFC d) C++ e) Ethernet
answer
a) ZigBee b) Bluetooth c) NFC
question
Ch. 3 question 5 matching
answer
question
Ch. 3 Fill in the blank. A default _______ must be configured on an IP-enabled end device so that the device can communicate with devices on different IP networks.โ
answer
gateway
question
Ch. 3 Fill in the blank. _______ is software that is embedded into the read-only memory of devices such as watches and cell phones. This limited functionality software is often used to boot the device.
answer
firmware
question
Ch. 3 How many bits make up an IPv6 address? A) 132 B) 48 C) 128 D) 32 E) 64
answer
C) 128
question
Ch. 3 Why is a common protocol suite necessary for transmission of data over remote networks? A) to reduce the number of vendors needed B) to ensure the interoperability of devices from various vendors C) to consolidate multiple protocols for both short distance and long distance networks D) to increase the bandwidth of network connections
answer
B) to ensure the interoperability of devices from various vendors
question
Ch. 3 Which type of device will be most responsible for the explosive growth of the IoT? a) sensors b) computers c) actuators d) smart phones
answer
a) sensors
question
Ch. 3 What statement describes Fog computing? a) It supports larger networks than Cloud computing does. b) It utilizes a centralized computing infrastructure that stores and manipulates big data in one very secure data center. c) It requires Cloud computing services to support non-IP enabled sensors and controllers. d) It creates a distributed computing infrastructure that provides services close to the network edge.
answer
d) It creates a distributed computing infrastructure that provides services close to the network edge.
question
Ch. 4 A vibration sensor on an automated production line detects an unusual condition. The sensor communicates with a controller that automatically shuts down the line and activates an alarm. What type of communication does this scenario represent? A) people-to-machine B) people-to-people C) machine-to-people D) machine-to-machine
answer
D) machine-to-machine
question
Ch. 4 Which scenario is an example of M2P interactions in an IoE implementation? a) a wireless sensor obtaining an IP address dynamically b) sensors and actuators controlling equipment operation c) sensors reporting the status of equipment on a production line to a controller d) a technician investigating a condition reported by a sensor
answer
d) a technician investigating a condition reported by a sensor
question
Ch. 4 What process in a basic wireless security implementation is used to encode information so that only authorized individuals can read it? a) authorization b) authentication c) encryption d) polarization
answer
c) encryption
question
Ch. 4 Connecting things in the IoT requires the convergence of information technology and ___________ technology within an organization. a) analytical b) operational c) infrastructure d) financial e) statistical
answer
b) operational
question
Ch. 4 What effect is the Internet of Things expected to have on the amount of data generated on the Internet? a) exponential growth b) stay about the same c) dramatic decrease
answer
a) exponential growth
question
Ch. 4 The IoE can improve employee productivity through empowering employees with tools to complete their work where and how they need. True/False?
answer
True
question
Ch. 4 question 7
answer
question
Ch. 4 Which two types of devices can be used to protect end devices in the IoE from attacks? (Choose two.) a) sensor b) firewall c) DSL and cable modems d) file server e) intrusion prevention system
answer
b) firewall e) intrusion prevention system
question
Ch. 4 Which layer of the Cisco IoE architectural approach includes the proper mix of hardware and software within the corporate environment, Cloud, and service provider network? a) network b) platform c) infrastructure d) application
answer
c) infrastructure
question
Ch. 4 In the Cisco Streamlines Old Mining Operations video, what type of device would monitor the truck drivers for alertness? a) sensor b) satellite c) actuator d) wireless router e) GPS
answer
a) sensor
question
Ch. 2 As IoE connections are evolving, which component will change to get the right information to the right place at the right time more efficiently? things people intelligence process
answer
process
question
Ch. 2 question2
answer
question
Ch. 2 A few days ago, a person was browsing a website that sells sporting goods. After some time, this person receives an email from the same website about a sale on a similar item. What kind of business practice is this?โ telemarketing retail marketing micromarketing
answer
micromarketing
question
Ch. 2 Which scenario is an example of an M2M interaction in a retail IoE solution? When a customer removes an item from the shelf, the RFID tag sends an inventory update message to the ordering management system. A customer uses a kiosk to order food in a gas station. A customer reviews the receipt after paying the shopping expense with a credit card. An employee replenishes canned fruits to a shelf after the sensor sends the signal that the shelf is almost empty.
answer
When a customer removes an item from the shelf, the RFID tag sends an inventory update message to the ordering management system.
question
Ch. 2 In a new smart home, the refrigerator has a sensor that detects that the milk container is almost empty. To what device would this sensor send this data so that eventually a text message is sent to the home owner? sensor server Internet provider server controller RFID
answer
controller
question
Ch. 2 True or False? The term big data refers only to the amount of data being generated?
answer
False
question
Ch. 2 How do packets travel across the Internet? They are packet switched independently, from router to router, along the best path. An end-to-end circuit is created between the source and destination before the packets are transmitted. The ISP of the sender communicates with the destination device to determine the path the packets should take through the Internet. They are broadcast across all links on the Internet until they are received by the destination device.
answer
They are packet switched independently, from router to router, along the best path.
question
Ch. 2 What is the purpose of an IP address? It identifies the source and destination of data packets on a network. It identifies a return address for replying to email messages. It identifies a location in memory from which a program runs. It identifies the physical location of a data center.
answer
It identifies the source and destination of data packets on a network.
question
Ch. 2 A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation? maintaining communication integrity virtualization BYOD online collaboration
answer
virtualization
question
Ch. 2 What are two reasons that electronic data is represented as bits? (Choose two.) Bits are more secure and make transmissions harder to hack. Bits are more efficient for storing data. Bits are the format best understood by people. Bits can be transmitted over longer distances without quality degradation. Bits decrease the number of connections that need to be made in the IoE.
answer
Bits are more efficient for storing data. Bits can be transmitted over longer distances without quality degradation.
American National Standards Institute
Blue Cross Blue Shield
Digital Subscriber Line
Health Computing
Chapter 8 The Electronic Claim 120 terms

Suzette Hendon
120 terms
Preview
Chapter 8 The Electronic Claim
question
Accredited Standards Committee X12
answer
The United States standards body formed by the American National Standards Institute (ANSI) for cross-industry development, maintenance, and publication of electronic data exchange standards.
question
Accredited standards Committee X12 Version 5010
answer
System developed by the American National Standards Institute that meets HIPAA standards for the transmission of either ICD-9 or ICD-10 diagnostic code data.
question
application service provider
answer
A practice management system available over the internet in which data are housed on the server of the ASP, but the accounts are managed by the health care provider's staff.
question
back up
answer
A duplicate data file, such as tape, CD-ROM, disk, or zip disk, used to record data; it may be used to complete or redo the operation if the primary equipment fails.
question
batch
answer
A group claims for different patients from one office submitted in one computer transmission.
question
business associated agreement
answer
Contract between the provider and a clearinghouse that submits the electronic claims on behalf of the provider.
question
cable modem
answer
A modem used to connect a computer to a cable television system that offers online services.
question
claim attachments
answer
Documents that contain information, hard copy or electronic, related to a completed insurance claim that assists in validating the medical necessity or explains the medical service or procedure for payment (e.g., operative report, discharge summary, invoice).
question
clearinghouse
answer
a service company that recieves electronic or paper claims from the provider, checks and prepares them for processing, and transmits them in HIPAA-complaint format to the correct carriers
question
code sets
answer
Any set of codes with their descriptions used to encode data elements, such as tables of terms, medical concepts, medical diagnostic codes, or medical procedure codes.
question
covered entity
answer
same as definition in Chapter 2
question
data elements
answer
Medical code sets used uniformly to document why patients are seen (diagnosis, ICD-9-CM) and what is done to them during their encounter (procedure, CPT-4, HCPCS).
question
digital subscriber line
answer
A high-speed connection through a telephone line jack and usually a means of accessing the Internet.
question
direct data entry
answer
Keying claim information directly into the payer system by accessing over modem dial-up or DSL. This is a technology to directly enter the information into the payer system via the access whether it is dial-up or DSL.
question
electronic data interchange
answer
The process by which understandable data items are sent back and forth via computer linkages between two or more entities that function alternatively as sender and receiver.
question
electronic funds transfer
answer
A paperless computerized system enabling funds to be debited, credited, or transferred, eliminating the need for personal handling of checks.
question
electronic remittance advice
answer
An online transaction about the status of a claim.
question
clearing house
answer
Software that receives insurance claims from the providers; performs, edits and sends them to the insurance carriers.
question
encoder
answer
An add-on software program to practice management systems that can reduce the time it takes to build or review insurance claims before batch transmission to the carrier.
question
National Standard Format
answer
The name of the standardization of data to reduce paper and have more accurate information and efficient organization.
question
HIPAA Transaction and Code Sets Rule
answer
This regulation under Health Insurance Portability and Accountability Act (HIPAA) defines the standardized methods for transmitting electronic health information. The TCS process includes any set of HIPAA-approved codes with their descriptions used to encode data elements, such as tables of terms, medical concepts,medical diagnostic codes, or medical procedure codes. TCS regulations were implemented to streamline electronic data interchange.
question
password
answer
A combination of letters and numbers that each individual is assigned to access computer data.
question
real time
answer
Online interactive communication between two computer systems allowing instant transfer of information.
question
standard transactions
answer
The electric files in which medical data are compiled to produce a specific format.
question
T-1
answer
A T-carrier channel that can transmit voice or data channels quickly.
question
taxonomy codes
answer
Numeric and alpha provider specialty codes that are assigned and classify each health care provider when transmitting electronic insurance claims.
question
trading partner
answer
same as definition for Business associate in Chapter 2
question
encryption
answer
To assign a code to represent data. This is done for security purposes.
question
trading partner agreement
answer
Contract between the provider and a clearinghouse that submits the electronic claims on be half of the provider.
question
ANSI
answer
American National Standards Institute
question
ASC X12
answer
Accredited Standards Committee X12
question
ASET
answer
administrative simplification enforcement tool
question
ASP
answer
application service provider
question
ATM
answer
automated teller machine
question
DDE
answer
direct data entry
question
DHHS
answer
Department of Health and Human Services
question
DSL
answer
Digital Subscriber Line
question
EDI
answer
electronic data interchange
question
EFT
answer
electronic funds transfer
question
EHR
answer
electronic health record
question
EMC
answer
electronic medical claim
question
EOMB
answer
explanation of Medicare benefits
question
ePHI
answer
electronic protected health information
question
ERA
answer
electronic remittance advice
question
HPID
answer
Health Plan Identifier
question
IRS
answer
Internal Revenue Service
question
MTS
answer
Medicare Transaction System
question
NDC
answer
National Drug Code
question
NSF
answer
National Standard Format
question
PMS
answer
practice management software
question
TCS Rule
answer
HIPAA Transaction and Code Set Rule
question
UPS
answer
Uninterruptible Power Source
question
Exchange of data in a standardized format through computer systems is a technology known as..
answer
Electronic Data Interchange (EDI)
question
The act of converting computerized data into a code so that unauthorized users are unable to read it is a security system known as....
answer
Encryption
question
Payment to the provider of service of an electronically submitted insurance claim may be received in approximately...
answer
Two Weeks or Less
question
Medical Practices that do not use the services of clearinghouses submit claims through a ____to the insurance company...
answer
Carrier-Direct/Direct Links
question
The benefits of using HIPAA standard transaction and code set
answer
A).Translations of various formats to the HIPAA-complaint standard format B).Reduction in time of claims preparation C).Fewer Claim Rejections D).Cost-Effective method through loss prevention' E).Fewer delays in processing and quicker response time F).More accurate coding with claims edits G).Consistent Reimbursement
question
Dr. Morgan has 10 or more full-time employees and submits insurance claims for his Medicare patients. Is his medical practice subject to the HIPAA transaction rules?
answer
Yes-Compliance is Required
question
Dr. Maria Montez does not submit insurance claims electronically and has five full-time employees. Is she required to abide by HIPAA transaction rules?
answer
It is not required to comply
question
Standard Code Sets used for the following....
answer
)( Physician Services)-(CPT), Current Procedural Terminology (Diseases and Injuries)-International Classification of Diseases, Ninth Revision, Clinical Modifications, Volumes 1 and 2 (ICD-9-CM) (Pharmaceuticals and Biologicals)-National Drug Code (NDC)
question
The staff at College clinic submits professional health care claims for each of their providers and must use the industry standard electronic format called_______________ to submit them electronically
answer
ASC X12N 837P
question
The billing department at college clinic must use the industry standard electronic format called ___________ to transmit health care claims electronically
answer
ASC X12N 837I
question
The Medicare fiscal intermediary (insurance carrier) uses the industry standard electronic format called____to transmit payment information to the college clinic and college hospital.
answer
ASC X12N 835
question
It has been 3 weeks since Gordon Marshall's health care claim was submitted to the XYZ insurance company and you wish to inquire about the claim.The industry standard electronic format that must be used to transmit this inquiry is called_________
answer
ASC X12N 276/277
question
Dr.Practons insurance billing specialist must use the industry standard electronic format called __________to obtain information about beatrice garcia's health policy benefits and coverage from the insurance plan.
answer
ASC X12N 270/271
question
The family practice taxonomy code is..
answer
207q0000x
question
The American National Standards Institute formed the___which developed the electronic data exchange standards.
answer
ASC X12N
question
Refer to table 8-4 in the handbook to name the levels of data collected to construct and submit a electronic form
answer
High-level information Claim-level information Specialty claim-level information Service line-level information Specialty service line-level information Other information
question
HIPAA electronic standards for claim submission were upgraded to version ________ and all providers,payers, and clearinghouses were required to use it effective January 1, 2012
answer
5010
question
The claims attachment standards have not yet been adopted;however the health insurance specialist should prepare for the final rule that is expected to be published no later than __________
answer
January 1, 2014
question
The _______ is an all numeric 10-character number assigned to each provider and required for all transactions with health plans effective May 23, 2007
answer
NPI
question
The most important function of a practice management system is _________
answer
accounts receivable
question
To look for and correct all errors before the health claim is transmitted to the insurance carrier,you may print an insurance billing worksheet or perform a front-end audit or
answer
scrubber
question
much of the patient and insurance information required to complete the cms-1500 form can be found on the ___________ form that is used to post charges.
answer
encounter
question
Add on software to a practice management system that can reduced the time it takes to build or review a claim before batching is known as a / an
answer
encoder
question
Software that is used in a network that serves a group of users working on a related project allowing access to the same data is a /an
answer
grouper
question
Many insurance companies, such as Medicare, provide instant access to information about pending claims though online _______________
answer
ERA-electronic remittance advice
question
An electronics funds transfer agreement may allow for health plans to ___________ overpayments from a provider's bank account.
answer
recoup
question
The medicare electronic remittance advice was previously referred as a/an _________________________
answer
EOMB-explanation of medicare benefits
question
On completion of a signed agreement and approval of enrollment with a third party payer for electronic claims submission, the provider will be assigned a ________________________ number.
answer
submitter
question
When computer software is upgraded, the physician must submit a batch of ___________________ to the insurance carrier to determine if claims can be transmitted successfully.
answer
test files
question
Under HIPAA transaction standard ASC X12 version 5010,a _____________ digit zip code is required to report service facility locations.
answer
nine
question
The ________________________________ is a electronic tool that enables organizations to file a complaint against a noncompliant covered entity that is negatively impacting the efficient processing of claims.
answer
ASET-ADMINISTRATIVE SIMPLIFICATION ENFORCEMENT TOOL
question
Access controls allow organizations to create _____________ for each job category that will restrict access to certain data.
answer
password
question
Under HIPAA, ________________ efforts must be made to limit the use and disclosure of PHI.
answer
reasonable
question
Electronic claims are submitted by means of
answer
EDI
question
Today most claims are submitted by means of
answer
EDI
question
The online error process allows providers to
answer
correct claim errors prior to transmission of the claim
question
Under HIPAA, data elements that are use uniformly to be documented why patients are seen (diagnosis) and what is done to them during their encounter(procedure) are known as
answer
medical code sets
question
The standard transaction that replaces the paper cms-1500 (02-1200) claim form and more than 400 versions of the electronic national standard format is called the
answer
837P
question
The next version of the electronic claims submission that will be proposed for consideration once lessons are learned from implementation of version 5010 will be
answer
version 6020
question
A standard unique number that will be assigned to identify individual health plans under the affordable care act is referred to as an
answer
HPID
question
Uniform patient identifiers
answer
were required on all claims effective may 23 2007
question
Encounter forms should be reviewed annually for changes that may have been made to
answer
diagnosis codes procedure codes HCPCS codes
question
A technique for entry of data which can save time and keystrokes by recording commands into memory is referred to as use of
answer
macros
question
An authorization and assignment of health benefits signature for a patient who was treated in the hospital but has never been to the providers office
answer
is not required;the authorization obtained by the hospital applies to that provider's claim filing.
question
A paperless computerized system that enables payments to be transferred automatically to a physician's bank account by a third party payer may be done via
answer
EFT-electronic funds transfer
question
An electronic Medicare remittance advice that takes the place of a paper medicare explanation of benefits (EOB) is referred to as
answer
ANSI 835
question
A method for submitting claims electronically by keying information into the payer system for processing is accomplished through use of
answer
direct data entry-DDE
question
A report that is generated by a payer and sent to the provider to show how many claims were received as electronic claims and how many were automatically rejected and will not be processed is called an
answer
transaction transmission summary
question
The HIPAA transaction standard ASC X12 version 5010 requires that anesthesia services be reported
answer
per minute
question
Which section of the HIPAA security rule recommends unique usernames and passwords to log on to any computer with access to PHI?
answer
technical safeguards
question
Which section of the HIPAA security rule recommends use of screensavers that will activate 1 to 60 minutes of inactivity
answer
physical safeguards
question
Verification of successful backups by comparing original records with copied records should be performed
answer
once a week
question
An acceptable method for ensuring that ePHI cannot be recovered from a hard drive that is being disposed of is by
answer
deletion of files formatting hard drives incineration
question
Like paper claims electronic claims require the performing physicians signature
answer
False
question
Claims must be submitted to various insurance payers in a single batch electronic transmission
answer
True
question
under hipaa insurance payers can require health care providers to use the payers own version of local code sets
answer
false
question
as icd and cpt codes are deleted and become obsolete they should immediately be removed from the practices computer system
answer
false
question
hipaa has brought forth electronic formats for determination of eligibility for a health insurance plan
answer
true
question
hipaa's electronic standard transactions are identified by a four digit number that proceeds asc x12n
answer
false
question
implementation of icd-10 resulted in a upgrade to hipaa transaction standard asc x12 version 6020
answer
false
question
hipaa requires that the npi number be used to identify employers rather than inputting the actual name of the company when submitting claims
answer
true
question
hipaa limits how computer systems may transmit data and formats for storage of data
answer
true
question
a paper remittance advice is generated by medicare when using ansi 835 version 5010
answer
true
question
hipaa transaction standard asc x12 version 5010 allows employers identification numbers to be used to report as a primary identifier
answer
false
question
when transmitting electronic claims inaccuracies that violate the hipaa standard transaction format are known as syntax errors
answer
true
question
an organization may file a complaint online against someone whose actions impact the ability of a transaction to be accepted or efficiently processed by using the administrative simplification enforcement tool (ASET)
answer
true
question
incidental uses and disclosures of protected health information(PHI) are permissible under hipaa when reasonable safeguards have been used to prevent inappropriate revelation of phi
answer
true
question
deleting files or formatting the hard drive is sufficient to keep electronic protected health information from being accessed
answer
false
Audio
Computer Networks
Digital Subscriber Line
Internet
Social Networking Site
Social Networking Sites
Solid State Drive
ะกomputer Networking and Communication Flashcards 48 terms

Richard Lattimore
48 terms
Preview
ะกomputer Networking and Communication Flashcards
question
A lower bandwidth means more data transmits
answer
false
question
A(n) ____________________ address is a number that uniquely identifies the location of each computer or device connected to the Internet.
answer
IP
question
All social networking sites have a specialized audience.
answer
True
question
The major differences between server computers like the one in the accompanying figure and client computers are that the client typically has more power, more storage space, and expanded communications capabilities
answer
question
A search engine displays a list of webpage names that contain the search text. What is the term for that list
answer
Hits
question
USB flash drives and memory cards usually hold more than hard disks like the kind shown in the accompanying figure
answer
False
question
A TCP server is an Internet server that usually is associated with an Internet access provider
answer
False
question
A computer like the one in the accompanying figure weighs up to ____________________ pounds (depending on the configuration
answer
10
question
A(n) ____________________ is a named collection of stored data, instructions, or information and can contain text, images, video, and audio
answer
File
question
A mobile processor is a type of software for computers and mobile devices that reads a user's specified web feeds and collects their most recent content
answer
False
question
A(n) ____________________ name is the text-based name that corresponds to the IP address of a server that hosts a website.
answer
Domain
question
According to netiquette, Internet users should assume which of the following
answer
the use of all capital letters is the equivalent of shouting
question
A(n) ____________________ is a filtering program that stops pop-up ads from displaying on webpages
answer
pop up
question
A(n) ____________________ is software that finds websites, webpages, images, videos, news, maps, and other information related to a specific topic
answer
Search engine
question
A game console is small enough to fit in one hand, making it more portable than the handheld game device.
answer
False
question
A(n) ____________________ is a motion you make on a touch screen with the tip of one or more fingers or your hand
answer
gesture
question
A megabyte is equal to approximately one billion characters.
answer
False
question
Because technology changes, you must keep up with the changes to remain digitally ____________________.
answer
literate
question
A blog is an informal website consisting of time-stamped articles in a diary or journal format, usually listed in reverse chronological order.
answer
True
question
0 out of 1.67 points Incorrect A(n) ____________________ is a duplicate of content on a storage medium that you can use in case the original is lost, damaged, or destroyed
answer
Backup
question
A(n) ____________________ is an Internet-capable phone that usually also includes a calendar, an appointment book, an address book, a calculator, a notepad, games, and several other apps (programs).
answer
Smartphone
question
A(n) ____________________ is an input device that converts printed material into a form the computer can process
answer
Scanner
question
Which of the following is a collection of computers and devices connected together, as shown in the accompanying figure, often wirelessly, via communications devices and transmission media
answer
Network
question
Using the technology shown in the accompanying figure, others connected to the same server see what a user has typed
answer
True
question
0 out of 1.67 points Incorrect A(n) ____________________ is a collaborative website that allows users to add to, modify, or delete the website content via their browser. Selected Answer: Incorrect [None Given]
answer
wiki
question
A hot spot is a wireless network that provides Internet connections to mobile computers and devices.
answer
True
question
Most examples of the kind of computer shown in the accompanying figure can operate solely on batteries
answer
False
question
All social networking sites require friends to confirm a friendship
answer
False
question
of 1.67 points Incorrect A web ____________________ is software that finds websites, webpages, images, videos, news, maps, and other information related to a specific topic
answer
Search engine
question
An entertainment website contains content that describes a cause, opinion, or idea
answer
False
question
Servers like the one in the accompanying figure typically support only one computer at a time
answer
Falsee
question
Bing, Google, and Yahoo! are all examples of web ____________________.
answer
Search engines
question
Most websites of the kind shown in the accompanying figure require payment for services
answer
False
question
Similar to an editorial section in a newspaper, websites like the kind shown in the accompanying figure reflect the interests, opinions, and personalities of the author.
answer
True
question
Incorrect A phishing filter will prevent your browsing history, passwords, user names, and other personal information from being revealed
answer
False
question
The difference between a wiki and a site like the one in the accompanying figure is that users cannot modify original posts on an wiki.
answer
False
question
0 out of 1.67 points Incorrect As wikis have grown in number, size, and popularity, many educators and librarians have shunned the sites as valid sources of research `
answer
TrueTrue
question
A(n) ____________________ device is a computing device small enough to hold in your hand. Selected Answer
answer
mobile
question
(n) ____________________, which is similar to a password, consists of several words separated by spaces
answer
passphrase
question
0 out of 1.67 points Incorrect A(n) ____________________ is a portable storage device that is small and lightweight enough to be transported on a keychain or in a pocket
answer
USB Flash Drive
question
. 0 out of 1.67 points Incorrect A(n) ____________________ is a mobile computing device designed for single-player or multiplayer video games.
answer
Game console
question
. 0 out of 1.67 points Incorrect A disadvantage with a subject directory is that users sometimes have difficulty deciding which categories to choose as they work through the menus of links presented
answer
True
question
The term ____________________ refers to the worldwide collection of websites like the one in the accompanying figure
answer
blogsphere
question
webpage is a collection of related websites
answer
False
question
Batteries in the kind of computer shown in the accompanying figure typically last longer than those in tablets.
answer
False
question
A password is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user.
answer
False
question
Collections, such as that pictured in the accompanying figure, allow computers to share which of the following?
answer
resources
question
. 0 out of 1.67 points Incorrect An Internet connection is not necessary for participating in e-commerce.
answer
false
Business Management
Computer Programming
Digital Subscriber Line
Topology
Work From Home
Chapter11 – Flashcards 68 terms

Kayden Hussain
68 terms
Preview
Chapter11 – Flashcards
question
1. The Internet can transfer conventional data and voice data.
answer
T
question
2. It wasn't until the 1950s that POTS began carrying computer data signals as well as voice signals.
answer
F
question
3. Only two wires are required to complete a telephone circuit.
answer
T
question
4. A trunk has a unique telephone number associated with it.
answer
F
question
5. Subscriber loops usually transmit digital signals, which require amplifiers every few kilometers.
answer
F
question
6. Prior to 1984, AT (American Telephone and Telegraph) owned all the long-distance telephone lines in the United States.
answer
T
question
7. Telephone systems were originally designed to transmit the human voice.
answer
T
question
8. The more information you wish to send over a medium, the lower the frequency of the signal you need to represent that information.
answer
F
question
9. When they were originally introduced many years ago, dial-up modems were capable of data transfer speeds of merely 15 to 30 bits per second.
answer
F
question
10. A V.92 modem can place a data connection on hold should someone call the user's telephone number.
answer
T
question
11. An asymmetric service is useful for an Internet connection in which the bulk of the traffic comes down from the Internet to the workstation.
answer
T
question
12. Most residential DSL services are symmetric.
answer
F
question
13. There is only one DSL format in use today.
answer
F
question
14. A cable modem is a physical device that separates the computer data from the cable television video
answer
T
question
15. Cable modem connections are typically symmetric.
answer
F
question
16. The most popular example of a leased line service is the T-1.
answer
T
question
17. Quarter-T-1 and half-T-1 lines are called fractional T-1 services.
answer
T
question
18. The frame relay service can only be a long-distance service.
answer
F
question
19. Frame relay is called a layer 6 protocol.
answer
F
question
20. Typically, frame relay is a replacement for the leased lines that connect a business to other businesses or connect multiple offices of the same business.
answer
T
question
21. Local high-speed telephone connections are almost always less expensive than long-distance, high-speed telephone connections.
answer
T
question
22. The price of the PVC is inversely proportional to the CIR level.
answer
F
question
23. Frame relay was originally designed and used to transfer packets of data between two sites more cost effectively than leased lines could.
answer
T
question
24. ATM transfer rates are as fast as 311 Mbps.
answer
F
question
25. A real-time interactive application is one of the most demanding with respect to data transmission rate and network throughput.
answer
T
question
26. DSL and cable modems are more expensive than frame relay systems at comparable speeds.
answer
F
question
27. Convergence has had a particularly noticeable impact on the telecommunications market.
answer
T
question
28. ATM clearly dominates in the local area network arena.
answer
F
question
29. A company that wishes to have its own in-house telephone system will often buy or lease a PBX.
answer
T
question
30. Frame relay and ATM are losing market share to Internet services such as FTP and Telnet.
answer
F
question
1. The local loop commonly consists of either four or ____ wires. a. six c. nine b. eight d. ten
answer
b. eight
question
2. On the other end of the local loop is the local telephone company's ____. a. trunk c. central office b. interLATA d. intraLATA
answer
c. central office
question
3. As long as a telephone call remains within a LATA (a(n) ____ call), the telephone call is local and is handled by a local telephone company. a. intraLATA c. outerLATA b. extraLATA d. outLATA
answer
a. intraLATA
question
4. If the telephone call passes out of one LATA and into another (a(n) ____ call), the telephone call is long distance and must be handled by a long-distance telephone company. a. intraLATA c. inLATA b. innerLATA d. interLATA
answer
d. interLATA
question
5. The telephone network consists of two basic types of telephone lines: a subscriber loop, or standard telephone line, and a ____. a. trunk c. LATA b. CIR d. SONET
answer
a. trunk
question
6. After the 1984's Modified Final Judgment, the long-distance telephone companies became known as ____. a. local exchange carriers (LECs) c. interexchange carriers (IECs or IXCs) b. central office exchange service d. private branch exchange (PBXs)
answer
c. interexchange carriers (IECs or IXCs)
question
7. A(n) ____ is a service from local telephone companies in which up-to-date telephone facilities at the telephone company's central (local) office are offered to business users, so that they don't need to purchase their own facilities. a. local exchange carriers (LECs) c. interexchange carriers (IECs or IXCs) b. central office exchange service d. private branch exchange (PBXs)
answer
b. central office exchange service
question
8. A(n) ____ handles all in-house calls and places calls onto outside telephone lines. a. local exchange carriers (LECs) c. interexchange carriers (IECs or IXCs) b. local access transport area (LATA) d. private branch exchange (PBXs)
answer
d. private branch exchange (PBXs)
question
9. ____ are permanent direct connections between two specified points. a. Tie lines c. Centrex b. PBXs d. IPX
answer
a. Tie lines
question
10. The Telecommunications Act of 1996 mandated that the existing local telephone companies, now called ____, must give CLECs access to their telephone lines. a. private Branch Exchange (PBX) b. Centrex (central office exchange service) c. incumbent local exchange carriers (ILECs) d. interexchange carriers (IECs)
answer
c. incumbent local exchange carriers (ILECs)
question
11. The ____ standard is a 56,000-bps dial-up modem standard approved by a standards-making organization rather than a single company. a. R.56 c. 802.11Q b. V.90 d. 803.1
answer
b. V.90
question
12. A(n) ____ connection is one in which the transfer speeds in both directions are equal. a. symmetric c. static b. asymmetric d. dynamic
answer
a. symmetric
question
13. A(n) ____ connection has a faster downstream transmission speed than its upstream speed. a. symmetric c. asymmetric b. static d. dynamic
answer
c. asymmetric
question
14. Because DSL is an always-on connection, it uses a ____ circuit instead of a switched circuit. a. changing c. virtual b. dynamic d. permanent
answer
d. permanent
question
15. When no splitter is used to separate the DSL signal from the POTS signal, then the service is called ____. a. asymmetric DSL c. symmetric DSL b. splitterless DSL d. POTSless DSL
answer
b. splitterless DSL
question
16. Digital subscriber line comes in a variety of formats. Often collectively referred to as ____. a. ADSL c. SDSL b. CDSL d. xDSL
answer
d. xDSL
question
17. ____ is a popular format that transmits the downstream data at a faster rate than the upstream rate. a. Asymmetric digital subscriber line (ADSL) b. Consumer DSL (CDSL) c. DSL Lite d. High bit-rate DSL (HDSL)
answer
a. Asymmetric digital subscriber line (ADSL)
question
18. ____ is a trademarked version of DSL with speeds that are a little slower than typical ADSL speeds. a. Asymmetric digital subscriber line (ADSL) b. DSL Lite c. Consumer DSL (CDSL) d. High bit-rate DSL (HDSL)
answer
b. DSL Lite
question
19. ____ is the earliest form of DSL. a. DSL Lite c. Very high data rate DSL (VDSL) b. High bit-rate DSL (HDSL) d. Rate-adaptive DSL (RADSL)
answer
b. High bit-rate DSL (HDSL)
question
20. ____ is a format in which the transfer rate can vary, depending on noise levels within the telephone line's local loop. a. DSL Lite c. Very high data rate DSL (VDSL) b. High bit-rate DSL (HDSL) d. Rate-adaptive DSL (RADSL)
answer
d. Rate-adaptive DSL (RADSL)
question
21. A ____ service is an all-digital connection that can transfer either voice or data at speeds up to 1.544 Mbps. a. T-1 c. T-3 b. T-2 d. T-4
answer
a. T-1
question
22. ____ is a packet-switched network that was designed for transmitting data over fixed lines. a. T-1 c. Frame relay b. IntraLATA d. InterLATA
answer
c. Frame relay
question
23. The designation layer ____ protocol means that frame relay technology is only one part of a network application and resides at the data link layer. a. 2 c. 4 b. 3 d. 6
answer
a. 2
question
24. When a customer establishes a permanent virtual circuit with a frame relay carrier, both customer and carrier agree on a data transfer rate called the ____. a. bit rate c. committed information rate (CIR) b. PVC rate d. LATA rate
answer
c. committed information rate (CIR)
question
25. The ____ allows the customer to exceed the committed information rate by a fixed amount for brief moments of time. a. bit rate c. committed information rate (CIR) b. burst rate d. LATA rate
answer
b. burst rate
question
26. Before ATM can transfer any data, you must first create a logical connection called a ____. a. virtual path connection (VPC) c. network-network interface b. virtual channel connection (VCC) d. network-user interface
answer
b. virtual channel connection (VCC
question
27. A ____ is a bundle of VCCs that have the same endpoints. a. virtual path connection (VPC) c. network-network interface b. virtual interface connection (VIC) d. network-user interface
answer
a. virtual path connection (VPC)
question
28. When a VCC transmits network management and routing signals, it is called the ____. a. virtual path connection (VPC) c. network-network interface b. virtual interface connection (VIC) d. network-user interface
answer
c. network-network interface
question
29. ____ is the most expensive ATM class of service. a. Variable bit rate (VBR) c. Unspecified bit rate (UBR) b. Available bit rate (ABR) d. Constant bit rate (CBR)
answer
d. Constant bit rate (CBR)
question
30. ____ applications often send bursts of data, and the ATM network guarantees that its traffic is delivered on time. a. Variable bit rate (VBR) c. Unspecified bit rate (UBR) b. Available bit rate (ABR) d. Constant bit rate (CBR)
answer
a. Variable bit rate (VBR)
question
31. ____ is capable of sending traffic that may experience bursts of data, but there are no promises as to when the data may be sent. a. Variable bit rate (VBR) c. Unspecified bit rate (UBR) b. Available bit rate (ABR) d. Constant bit rate (CBR)
answer
c. Unspecified bit rate
question
32. ____ means that users utilize a single desktop application to send and receive e-mail, voice mail, and fax. a. Interactive voice response c. Fax processing b. Unified messaging d. Third-party call control
answer
b. Unified messaging
question
33. ____ means that a user calling into a company telephone system provides some form of data by speaking into the telephone, and a database query is performed using this spoken information. a. Third-party call control b. Unified messaging c. Fax-back d. Integrated voice recognition and response
answer
d. Integrated voice recognition and response
question
34. In ____, a fax image that is stored on a LAN server's hard disk can be downloaded over a local area network, converted by a fax card, and sent out to a customer over a trunk. a. third-party call control c. fax processing b. unified messaging d. integrated voice recognition and response
answer
c. fax processing
question
35. ____ means that users have the ability to control a callโfor example, set up a conference callโwithout being a part of it. a. Third-party call control b. Unified messaging c. Fax-back d. Integrated voice recognition and response
answer
a. Third-party call control
question
36. ____ means that different icons on a computer screen represent common PBX functions such as call hold, call transfer, and call conferencing, making the system easier for operators to use. a. Third-party call control c. Fax-back b. PBX graphic user interface d. Call filtering
answer
b. PBX graphic user interface
question
37. ____ means that users can specify telephone numbers that are allowed to get through. a. PBX graphic user interface c. Fax-back b. Customized menuing system d. Call filtering
answer
d. Call filtering
question
38. MPLS and VPNs continue to replace which long-distance data services? a. Google and Yahoo c. frame relay and ATM b. Telnet and FTP d. frame relay and FTP
answer
c. frame relay and ATM
Digital Subscriber Line
Internet Service Providers
North America
Flashcard Internet 73 terms

Ray Collins
73 terms
Preview
Flashcard Internet
question
The Internet is one large network.
answer
Answer: False
question
The Internet is flat in structure.
answer
Answer: False
question
National Internet service providers connect together and exchange data at Network Access Points.
answer
Answer: True
question
Network access points were originally designed to connect only local ISPs.
answer
Answer: False
question
As the number of ISPs has grown, a new form of network access point called a metropolitan area exchange has emerged.
answer
Answer: True
question
Peering means that a national ISP does not charge another national ISP to transmit its messages.
answer
Answer: True
question
A point of presence is the place at which the ISP provides services to its customers.
answer
Answer: True
question
Technologies such as DSL and cable modem are called narrowband technologies.
answer
Answer: False
question
Digital Subscriber Line is a family of multipoint technologies.
answer
Answer: False
question
To use DSL, a customer needs a DSL Access Multiplexer installed at his or her location.
answer
Answer: False
question
Another term for a DSL modem is a DSL brouter.
answer
Answer: False
question
The least common type of DSL in use today is Asymmetric DSL.
answer
Answer: False
question
ADSL is called asymmetric because its two data channels have exactly the same speed.
answer
Answer: False
question
Very-high-data-rate Digital Subscriber Line is designed for use over long local loops.
answer
Answer: False
question
The dominant standard for a cable modem is Data over Cable System Interface Specification.
answer
Answer: True
question
A distribution hub includes a combiner and a Cable modem termination system.
answer
Answer: True
question
Wireless DSL is a line-of-sight technology
answer
Answer: True
question
Wireless Application Environment supports mobile wireless Internet applications on devices with small display screens operating over low speed wireless connections.
answer
Answer: True
question
Fiber-to-the-home is another term for satellite fixed wireless technology.
answer
Answer: False
question
The Internet Engineering Steering Group provides strategic architectural oversight for the Internet.
answer
Answer: False
question
Internet 2 is the common name for the Abilene network.
answer
Answer: True
question
Each of the networks in Internet 2 has a set of access points called terapops.
answer
Answer: False
question
At the top of the Internet structure are national ___________, such as AT&T and Sprint. a. Network Access Points b. Internet service providers c. bridges d. LATAs e. digital subscriber lines
answer
Answer: B
question
National ISPs connect together and exchange data at ___________. a. Network Access Points b. cable modem termination system endpoints c. distribution hubs d. the Internet engineering task force headquarters e. the Internet Society network center
answer
Answer: A
question
_________ are smaller versions of NAPs that link a set of regional ISPs. a. mini Network Access Points b. cable modem termination system endpoints c. distribution hubs d. metropolitan area exchanges e. points-of-presence
answer
Answer: D
question
__________ has led to the belief that the Internet is "free". a. Encrypting b. Peering c. Bridging d. Tolling e. Polling
answer
Answer: B
question
___________ refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE. a. Popping b. Peering c. Yiping d. Napping e. Chargebacking
answer
Answer: B
question
A _________ is the place at which the ISP provides services to its customers. a. remote access point b. network access point c. cable modem termination system endpoint d. point-of-presence e. metropolitan area exchange
answer
Answer: D
question
In general, local ISPs make money by charging ________. a. customers b. ICANN c. UCAID d. the DSLAM e. CSUs/DSUs
answer
Answer: A
question
A ___________ is used by ISPs to authenticate its customers. a. password server b. remote-access server. c. file server d. WAP server. e. Web server
answer
Answer: B
question
Which of the following is one of the national ISPs in North America? a. IETF b. IEEE c. IAB d. Sprint e. ISOC
answer
Answer: D
question
Technologies that provide higher-speed communications than traditional modems (e.g., DSL) are known as ______________ technologies. a. middleband b. narrowband c. rubberband d. metalband e. broadband
answer
Answer: E
question
Digital _________ Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines. a. System b. Satisfaction c. Speedy d. Subscriber e. Switch
answer
Answer: D
question
For access to DSL, __________ equipment is installed at the customer location. a. point-of-presence b. satellite dish c. customer premises d. metropolitan area exchange e. network access point
answer
Answer: C
question
A __________ separates traditional voice telephone transmission from the data transmissions in the equipment located at the customer site for DSL. a. line splitter b. V.32bis modem c. line analyzer d. main distribution frame e. network access point
answer
Answer: A
question
Data traffic from the customers premises is sent to a __________ which is located at the local carrier's end office. a. modem b. codec c. DSLAM d. NIC e. ATM
answer
Answer: C
question
The _________ is the connection from a home or business to the telephone company end office. a. distribution hub b. RFC c. UCAID d. local loop e. CA*net 3
answer
Answer: D
question
A DSL modem is also known as a: a. DSL bridge b. DSL brouter c. DSL router d. DSL gateway e. DSL hub
answer
Answer: C
question
At the DSL local carrier's office, the __________ demultiplexes the data streams and converts them into ATM data. a. DSLAM b. GrandSlam c. WAP d. line splitter e. X.25 PAD
answer
Answer: A
question
Asymmetric DSL uses ___________ multiplexing to create three separate channels over one local loop circuit. a. inverse b. time division c. statistical time division d. wave division e. frequency division
answer
Answer: E
question
To balance the trade-off between speed and distance in ADSL, most ADSL service providers have chosen a T1 level of ADSL, and offer it under the trademarked name of _________ ADSL. a. CA*net 3 b. DOCSIS c. G.Lite d. OE e. UCAID
answer
Answer: C
question
Very-high-data-rate DSL uses multiplexing to provide _________ channels. a. two b. three c. four d. five e. six
answer
Answer: B
question
Which of the following statements is true? a. On a circuit, the shorter the distance, the higher the speed. b. On a circuit, the longer the distance, the higher the speed. c. On a circuit, the longer the distance, less attenuation occurs. d. On a circuit, the shorter the distance, more attenuation occurs. e. When more attenuation occurs, higher frequency signals can be used effectively.
answer
Answer: A
question
A digital service offered by cable companies is the _________. a. Abilene network b. WAP proxy c. G.Lite ADSL d. cable modem e. Next Generation Internet
answer
Answer: D
question
Another term for cable networks that use both fiber-optic and coaxial cable is __________. a. fixed wireless b. mobile wireless c. distribution hub d. hybrid fiber coax e. fibrax
answer
Answer: D
question
A T1 level of ADSL has a maximum downstream rate of about _________ Mbps. a. 9000 b. 8.4 c. 1.5 d. 650 e. 6.1
answer
Answer: C
question
A headend is also referred to as a: a. Abilene network b. WAP proxy c. cable modem d. distribution hub e. fiber node
answer
Answer: D
question
Wireless DSL requires __________ to be effective. a. Abilene networks b. tall buildings or towers c. cable modems d. fiber nodes e. hybrid fiber coax
answer
Answer: B
question
A(n) __________ is used to connect a fiber optic cable from the cable TV company side to a coaxial cable on the customer side. a. CA*net 3 b. RFC c. WAP proxy d. fixed wireless connection e. optical-electrical converter
answer
Answer: E
question
A(n) ___________ contains a series of cable modems/multiplexers and converts the data from cable modem protocols into protocols needed for Internet traffic, before passing them to a router connected to an ISP POP. a. Internet steering system b. optical-electrical converter c. WAP proxy d. cable modem termination system e. fixed wireless system
answer
Answer: D
question
The multipoint version of fixed wireless is sometimes known as: a. point-to-multipoint b. point-to-point c. CA*Net3 d. DOCSIS e. DSLAM
answer
Answer: A
question
___________ is designed to enable the use of normal Web applications on computers and devices with small display screen operating over low speed wireless connections. a. CA*Net3 b. The Abilene network c. Internet 2 d. Wireless Application Protocol e. X.25 protocol
answer
Answer: D
question
A transceiver at the WAP gateway passes requests to a __________ server from a handheld device. a. main distribution b. Internet Society c. local loop d. wireless telephony application e. line splitter
answer
Answer: D
question
A ____________ translates a wireless application request to HTTP and sends it over the Internet to the desired Web server. a. passive optical scanner b. local loop c. cable modem d. peer e. WAP proxy
answer
Answer: E
question
Running fiber optic cable into the home as an alternative networking technology to DSL is called: a. passive optical networking b. active optical networking c. passive fibrous networking d. active fibrous networking e. wireless networking
answer
Answer: A
question
In passive optical networking, the optical signal has a maximum length of about __________. a. 500 meters b. 1000 meters c. 1 mile d. 5 miles e. 10 miles
answer
Answer: E
question
The ___________ is responsible for technical management of IETF and the Internet standards process. a. Internet Society b. University Corporation for Advanced Internet Development c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force
answer
Answer: C
question
The _________operates like the IETF through small research groups focused on specific issues. a. Internet Society b. University Corporation for Advanced Internet Development c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force
answer
Answer: E
question
In 1996, The National Science foundation provided $100 million to start the ___________ program to develop the very-high-performance Backbone Network Service. a. CA*Net3 b. UCAID c. Next Generation Internet d. Internet 3 e. WAP proxy
answer
Answer: C
question
Internet 2 is also known as: a. CA*Net3 b. IETF c. Next Generation Internet d. the Abilene network e. passive optical networking
answer
Answer: D
question
CA*Net3 was developed by a Canadian organization known as: a. IETF b. ARDNOC c. ADSL d. RFC e. UCAID
answer
Answer: B
question
Which of the following new Internet efforts was started by 34 universities? a. CA*net 3 b. ARDNOC c. vBNS d. NGI e. UCAID
answer
Answer: E
question
Another major high-speed network experimenting with long distance Ethernet over fiber is _____________. a. AT&T b. Sprint c. Yipes d. MCI WorldCom e. the National Lambda Rail
answer
Answer: E
question
Which of the following groups developed the Canadian next generation Internet? a. MCI WorldCom b. ARDNOC c. UCAID d. Yipes e. NSF
answer
Answer: B
question
Which of the following groups developed Internet 2? a. MCI WorldCom b. ARDNOC c. UCAID d. Yipes e. ISOC
answer
Answer: C
question
A high-speed Internet has a set of access points called ____pops that provide point-of-presence at ________ speeds. a. giga, gigabit b. mega, megabit c. multi, multibit d. giga, megabit e. multi, gigabit Answer: A
answer
Answer: A
question
Some of the new applications being developed for a high-speed Internet include a. Tele-immersion b. Tele-conferencing c. QoS d. Broadband e. Tele-phoning
answer
Answer:
question
_________ is being pioneered by Yipes.com. a. Active fibrous networking b. The Abilene network c. CA*Net3 d. Ethernet to the home e. Next Generation Internet
answer
Answer: D
question
One advantage of _____________ is that no conversations between LAN and WAN protocols are needed. a. active fibrous networking b. The Abilene network c. CA*Net3 d. ethernet to the home e. Next Generation Internet
answer
Answer: D
question
The closest the Internet has to an "owning" organization is the ___________. a. Internet Service Provider b. Abilene network c. CA*Net3 d. University Corporation for Advanced Internet Development e. Internet Society
answer
Answer: E
question
Which of the following is not part of the work of the Internet Society? a. public policy b. connecting optical-electrical converters c. education d. development of Internet standards e. maintenance of Internet standards
answer
Answer: B
question
The ________ is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and smooth operation of the Internet. a. Internet Society b. Internet Engineering Task Force c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force
answer
Answer: B
question
The ___________ is responsible for technical management of IETF and the Internet standards process. a. Internet Society b. University Corporation for Advanced Internet Development c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force
answer
Answer: C
Digital Subscriber Line
Frequently Asked Questions
Sales Force Automation
is final ch 13 mc – Flashcards 49 terms

Jacob Herring
49 terms
Preview
is final ch 13 mc – Flashcards
question
Trends that have led to the supply chain concept include all of the following except: a) Modern organizations are focusing on their core competencies. b) Modern organizations are concentrating on becoming more agile and flexible. c) Modern organizations are buying their suppliers in order to have more transparency along the supply chain. d) Modern organizations are relying on other companies to supply necessary goods and services. e) Modern organizations are relying on an increasing number of suppliers.
answer
c
question
_____ is the ability for all organizations in a supply chain to access or view relevant data on purchased materials as these materials move through their suppliers' production processes and transportation networks to their receiving docks. a) Supply chain visibility b) Horizontal integration c) Vertical integration d) Supply chain intelligence e) Supply chain integration
answer
a
question
_____ is the time between the receipt of incoming goods and the dispatch of finished, outbound products. a) Inventory turnover b) Inventory velocity c) Inventory speed d) Inventory time e) Inventory production
answer
b
question
A(n) _____ refers to the flow of materials, information, money, and services from raw material suppliers, through factories and warehouses to the end customers. a) demand chain b) business process c) manufacturing process d) supply chain e) enterprise resource process
answer
d
question
The _____ is comprised of a company's suppliers, the suppliers' suppliers, and the processes for managing them. a) suppliers' chain b) external supply chain c) upstream portion of the supply chain d) downstream portion of the supply chain e) entire supply chain
answer
c
question
Packaging, assembly, and manufacturing take place in which segment of the supply chain? a) upstream b) internal c) downstream d) external e) None of the choices are correct.
answer
b
question
The ________ refers to a company's organization and processes for distributing and delivering products to its final customers. a) suppliers' chain b) external supply chain c) upstream portion of the supply chain d) downstream portion of the supply chain e) entire supply chain
answer
d
question
Distribution or dispersal takes place in which segment of the supply chain? a) upstream b) internal c) downstream d) external e) None of the choices are correct.
answer
c
question
_____ are the physical products, raw materials, and supplies that flow along a supply chain. a) Reverse flows b) Reverse logistics c) Material flows d) Information flows e) Financial flows
answer
c
question
Returned products, recycled products, and disposal of materials or products are called ______________. a) reverse flows b) returns c) material flows d) information flows e) financial flows
answer
a
question
_____ consist of data that are related to demand, shipments, orders, returns, and schedules. a) Reverse flows b) Reverse logistics c) Material flows d) Information flows e) Financial flows
answer
d
question
_____ involve money transfers, payments, credit card information and authorization, payment schedules, e-payments, and credit-related data. a) Reverse flows b) Reverse logistics c) Material flows d) Information flows e) Financial flows
answer
e
question
Haya decided she was going to set up a tie store on her campus. Which of the following is true about Haya's supply chain? a) Haya's supplier is downstream in her supply chain. b) Haya's customers are upstream in her supply chain. c) If a customer returns a tie, that is known as reverse logistics. d) Haya has no information flows. e) Haya's supplier is the only other link in her supply chain.
answer
c
question
Taylor uses t-shirts to make bags. donates all of her profits. Which of the following is true about Taylor's supply chain? a) Taylor's supplier is downstream in her supply chain. b) Taylor's customers are downstream in her supply chain. c) Taylor has no information flows. d) Taylor's supplier is the only other link in her supply chain.
answer
b
question
The goals of supply chain management include which of the following? a) to reduce uncertainty and risks along the supply chain b) to reduce inventory levels c) to reduce cycle time d) to improve customer service e) All of the choices are correct.
answer
e
question
Which of the following is not a goal of supply chain management? a) to reduce uncertainty along the supply chain b) to decrease inventory levels c) to increase cycle time d) to improve customer service e) to improve business processes
answer
c
question
Interorganizational information systems result in all of the following except: a) reduced costs of routine business transactions b) improved quality of information flow c) reduced errors d) increased cycle time e) eliminated paper processing
answer
d
question
In the _____, the production process begins with a forecast. a) supply chain model b) inventory model c) pull model d) vertical integration model e) push model
answer
e
question
In the _____, the production process begins with a customer order. a) supply chain model b) inventory model c) pull model d) vertical integration model e) push model
answer
c
question
The _____ is known as make-to-stock. a) supply chain model b) inventory model c) pull model d) vertical integration model e) push model
answer
e
question
The _____ is known as make-to-order. a) supply chain model b) inventory model c) pull model d) vertical integration model e) push model
answer
c
question
Which of the following models best describes the business model of large automobile manufacturers? a) Supply chain model b) Inventory model c) Pull model d) Vertical integration model e) Push model
answer
e
question
Which of the following is not a problem along the supply chain? a) poor customer service b) high inventory costs c) loss of revenues d) decreased cycle times e) extra cost of expediting shipments
answer
d
question
The _____ refers to erratic shifts in orders up and down the supply chain. a) demand forecast effect b) supply forecast effect c) bullwhip effect d) inventory effect e) customer coordination effect
answer
c
question
The bullwhip effect results from which of the following? a) poor demand forecast b) price fluctuations c) order batching d) rationing within the supply chain e) All of the choices are correct
answer
e
question
Which of the following is not responsible for the bullwhip effect? a) poor demand forecast b) price fluctuations c) order batching d) rationing within the supply chain e) poor supply forecast
answer
e
question
Which of the following is not a possible solution to supply chain problems? a) vertical integration b) building inventories c) information sharing d) horizontal integration e) the bullwhip effect
answer
d
question
_____ is the strategy of purchasing upstream suppliers, in order to ensure availability of supplies. a) Horizontal integration b) Vertical integration c) Just-in-time inventory management d) Supply chain integration e) Customer order integration
answer
b
question
When Walmart sells a package of diapers, the company captures data on that sale at its point-of-sale terminal and transmits those data to the company that makes the diapers. When inventory gets too low, the diaper company ships more diapers in that Walmart store. This process is called _____________. a) supply chain management b) demand chain management c) vendor-managed inventory d) enterprise resource planning inventory e) just-in-time inventory
answer
c
question
Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school's monitors that would display in the dining halls and student union. Haya orders 40 ties in each of the school colors and 10 in each of four sports. Which of the following is true about Haya's supply chain? a) Haya is using a push model. b) Haya is using a pull model. c) Haya is experiencing the bullwhip effect. d) Haya has an accurate demand forecast. e) None of the above statements is true
answer
a
question
Haya decided she was going to set up a tie store on her campus. Haya orders 40 ties in each of the school colors and 10 in each of four sports. Which of the following is true about Haya's supply chain? a) Haya is using a just-in-time inventory system. b) Haya is using a vendor-managed inventory. c) Haya is building inventories d) Haya has vertical integration with her upstream supplier. e) Haya is using a pull model.
answer
c
question
Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school's monitors that would display in the dining halls and student union. Haya knows she needs to manage her relationship with her supplier. Which of the following is true? a) Haya should invest in EDI software. b) Haya can use the supplier's intranet to order. c) Haya should give the supplier access to her VPN. d) Haya can use the supplier's procurement portal to order merchandise. e) Haya can use the supplier's extranet to check on her order
answer
e
question
Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school's monitors that would display in the dining halls and student union. Haya orders 40 ties in each of the school colors and 10 in each of four sports. She almost instantly sells out of all the sport-themed ties. She decides to approach each of the sports teams on campus to see if they would be willing to buy ties "in bulk." Which of the following is true about Haya's supply chain as it relates to her new idea of having bulk sales? a) Haya is using a push model. b) Haya is using a pull model. c) Haya is experiencing the bull-whip effect. d) Haya has an accurate demand forecast.
answer
b
question
Taylor uses old t-shirts to make reusable shopping or grocery bags. People donate their old t-shirts. It takes her about 30 minutes per shirt to make the bag. She sells the bags at craft fairs and donates all of her profits to her favorite charity. Which of the following is true about Taylor's supply chain? a) Taylor is using a push model. b) Taylor is using a pull model. c) Taylor is experiencing the bullwhip effect. d) Taylor has an accurate demand forecast.
answer
a
question
Taylor uses t-shirts to make bags. donates charity. She is never very sure how many she will sell at each fair so she just makes what she can and hopes she has enough to meet demand. Which of the following is true about Taylor's supply chain? a) Taylor is practicing JIT inventory. b) Taylor has vertical integration. c) Taylor doesn't need accurate forecasts. d) Taylor is experiencing the bullwhip effect.
answer
d
question
Taylor uses t-shirts shopping bags. She sells the bags and donates. there is a craft fair coming up. have lots of bags targeted to the high school audience. Which of the following is true about Taylor's supply chain? a) Taylor is practicing JIT inventory. b) Taylor has vertical integration. c) Taylor doesn't need accurate forecasts. d) Taylor is experiencing the bullwhip effect.
answer
a
question
Taylor bags. donates profits. Taylor would be responsible for replenishing the inventory such that there are always ten bags on hand. Which of the following is true? a) This is an example of JIT inventory. b) This is an example of a push model. c) This is an example of vendor-managed inventory. d) This is an example of vertical integration.
answer
c
question
Taylor uses t-shirts to make bags. She sells the bags and donates A customer loved her bags at a recent fair and wants Taylor to make some for her. She has lots of "memory" t-shirts and Taylor's bags would make great gifts. Taylor is more than happy to take on this order. Which of the following is true? a) This is an example of a pull model. b) This is an example of a push model. c) This is an example of a bullwhip effect. d) This is an example does not affect Taylor's supply chain.
answer
a
question
The benefits of EDI include which of the following? a) data entry errors are minimized b) length of messages is shorter c) messages are secured d) fosters collaborative relationships e) All of the choices are correct.
answer
e
question
Which of the following is not a benefit of EDI? a) data entry errors are minimized b) length of messages is longer c) messages are secured d) fosters collaborative relationships e) reduced cycle time
answer
b
question
Which of the following is not a limitation of EDI? a) It is inflexible. b) It might require a company to restructure its business processes. c) It is expensive, but ongoing operating costs are low. d) Multiple EDI standards exist. e) It is difficult to make quick changes
answer
c
question
The primary goal of extranets is to ______ . a) foster collaboration between and among business partners b) provide security for corporate intranets c) provide effective communications inside corporate intranets d) enable corporate employees to view inventory information for their companies e) enable business partners to better plan mergers and acquisitions
answer
a
question
Extranets use _____ technology to make communication over the Internet more secure. a) telepresence b) anti-malware c) virtual private network d) voice-over IP e) videoconferencing
answer
c
question
The FedEx extranet that allows customers to track the status of a package is an example of which type of extranet? a) a company and its dealers, customers, and/or suppliers b) an industry's extranet c) joint venture d) B2B exchange e) B2C exchange
answer
a
question
The Bank of America extranet for commercial loans links lenders, loan brokers, escrow companies, title companies, and others. This is an example of which type of extranet? a) a company and its dealers, customers, and/or suppliers b) an industry's extranet c) B2C exchange d) B2B exchange e) joint venture
answer
e
question
_____ portals automate the business processes involved in purchasing products between a single buyer and multiple suppliers. a) Distribution b) Corporate c) Affiliate d) Intranet e) Procurement
answer
e
question
_____ portals automate the business processes involved in selling products from a single supplier to multiple buyers. a) Distribution b) Corporate c) Affiliate d) Intranet e) Procurement
answer
a
question
_____ portals automate the business processes involved in selling products from a single supplier to multiple buyers. a) Distribution b) Corporate c) Affiliate d) Intranet e) Procurement
answer
a
question
_____ portals automate the business processes involved in selling products from a single supplier to multiple buyers. a) Distribution b) Corporate c) Affiliate d) Intranet e) Procurement
answer
a
Computer Networks
Digital Subscriber Line
Internet Service Provider
Radio Frequency Identification
Wide Area Network
MIS 180 Ch. 7 Quiz Questions – Flashcards 21 terms

Julia Rush
21 terms
Preview
MIS 180 Ch. 7 Quiz Questions – Flashcards
question
Which benefits of a connected world make all applications, equipment (such as a high-volume printer), and data available to anyone on the network, without regard to the physical location of the resource or the user?
answer
Sharing resources
question
The potential for contracting viruses on mobile devices is increasing; in fact, the first known mobile phone virus was called
answer
Cabir
question
What is a feature of IPTV?
answer
IPTV uses low bandwidth, offers personalization, and supports multiple devices.
question
LANs, WANs,and MANs all provide users with an accessible and reliable network infrastructure. Which of the following are the most important network differentiating dimensions?
answer
Cost and performance
question
What are the two main methods for encrypting network traffic on the web?
answer
SSL and SHTTP
question
How do TCP and IP differ?
answer
TCP verifies the correct delivery of data in case it is corrupted, whereas IP verifies the data are sent to the correct IP address.
question
What is the major challenge of networking or performing business in a connected world?
answer
Security Issues
question
The Internet is a hierarchical structure linking different levels of service providers whose millions of devices supply all the interconnections. The three levels outlined in the book from the top down include
answer
National service provider (NSP), regional service provider (RSP), and Internet service provider (ISP)
question
Which of the following is a measure being considered to address privacy concerns with RFIDs and LBSs?
answer
Clearly labeled RFID tags on, kill codes, and RSA blocker tags.
question
Why would a company use an intranet?
answer
Intranets are used for business operations and management, intranets are used for communications and collaboration, intranets are used for Web publishing.
question
Which of the following is not a major ISP in the United States?
answer
apple
question
What are the two most prevalent types of broadband access?
answer
Digital subscriber line and cable connection
question
Which of the following is not a primary use of GIS?
answer
Ensuring safety equipment is on an airplane before a flight.
question
A wireless MAN (WMAN) is a metropolitan area network that uses ___________ to transmit and receive data?
answer
Radio signals
question
A wireless WAN (WWAN) is a wide area network that uses radio signals to transmit and receive data and can be divided into which two categories?
answer
Cellular and satellite communication systems
question
NSPs are private companies that own and maintain the worldwide backbone that supports the Internet. Which of the following is not an NSP?
answer
Microsoft
question
What is a disadvantage of networking or performing business in a connected world?
answer
Increases resources threats
question
Which of the following statements is not accurate in reference to mobile and wireless computing?
answer
Wireless technology is any type of operation accomplished with the use of a hard-wired connection
question
What are the five elements that are needed to create a connected world or network?
answer
Categories, providers, access technologies, protocols, and convergence
question
What is a benefit of network convergence?
answer
All of these
question
What is VoIP?
answer
All of these
Cisco
Digital Subscriber Line
Local Area Network
Systems Analysis
MIS 311 Ch 7 and Appendix B Quiz – Flashcards 20 terms

Jazzlyn Sampson
20 terms
Preview
MIS 311 Ch 7 and Appendix B Quiz – Flashcards
question
Which of the below is not a major ISPs in the United States? A. Earthlink B. NetZero C. Comcast D. Apple
answer
D. Apple
question
Which of the below statements is not accurate in reference to mobile and wireless computing? A. Mobile technology can travel with the user B. Wireless technology is any type of operation accomplished without the use of a hard-wired connection C. Wireless technology is any type of operation accomplished with the use of a hard-wired connection D. Mobile technology allows a user to download software to a laptop or cell phone for portable reading or reference
answer
C. Wireless technology is any type of operation accomplished with the use of a hard-wired connection
question
Which of the following is not a primary use of GIS? A. Finding what is nearby from a specific location B. Mapping densities C. Routing information D. Ensuring safety equipment is on an airplane before a flight.
answer
D. Ensuring safety equipment is on an airplane before a flight.
question
What is BRCK? A. It is an open-source software B. It gathers information from SMS, email and web, and put a map so that people could see what was happening where, and you could visualize that data. C. It acts as a backup generator for the Internet so that, when the power goes out, it fails over and connects to the nearest GSM network D. It is a physical space where people could collaborate, and it is now part of an integral tech ecosystem in Kenya
answer
C. It acts as a backup generator for the Internet so that, when the power goes out, it fails over and connects to the nearest GSM network
question
Which of the following Internet connection transmits analog signals? A. Dial-up B. DSL C. Cable D. All of the above
answer
D. All of the above
question
Which of the following is true about passive RFID tags? A. Passive RFID tags contain a barcode B. Passive RFID tags do not have a power source C. Passive RFID tags are more expensive when compared to active RFID tags D. All of the above
answer
B. Passive RFID tags do not have a power source
question
Which of the following applications does NOT offer location-based services? A. Yelp B. Urbanspoon C. Instagram D. None of the above
answer
D. None of the above
question
What are the five elements that are needed to create a connected world or a network? A. Categories, programs, alternatives, people, and core philosophy B. Program, providers, access, mechanics, and teachers C. Categories, providers, access technologies, protocols, and convergence D. LAN, WAN, MAN, PAN, and SAN
answer
C. Categories, providers, access technologies, protocols, and convergence
question
What is the largest and most important network that has evolved into a global information superhighway? A. Internet B. Intranet C. Extranet D. LAN
answer
A. Internet
question
Which of the below offers a common example of a LAN? A. College campus B. Home office C. City library D. All of the above
answer
D. All of the above
question
What are the two most prevalent types of broadband access? A. Data subscriber and cable connection B. Digital subscriber line and cable connection C. Digital line and client line D. Digital server and client server
answer
B. Digital subscriber line and cable connection
question
What can unified communications merge? A. IMing B. Videoconferencing C. Voice Mail D. All of the above
answer
D. All of the above
question
An extranet is not available for use by a _______________. A. Customer B. Supplier C. Employee D. Competitor
answer
D. Competitor
question
Which business application consists of hardware, software, and data that provide location information for display on a multidimensional map? A. Radio-frequency identification B. Global positioning systems C. Geographic information systems D. Location-based services
answer
C. Geographic information systems
question
Which of the following is a benefit of business mobility? A. Enhances mobility B. Provides immediate data access C. Provides alternative to wiring D. All of the above
answer
D. All of the above
question
Which of the following is false? A. A hub (switch or router) is the hardware to perform traffic control. B. Topology includes peer-to-peer networks and client/server networks. C. Media includes coaxial, twisted-pair, and fiber-optic. D. Simple Network Management Protocol (SNMP) allows networked nodes to be managed from a single point.
answer
B. Topology includes peer-to-peer networks and client/server networks.
question
Which of the following is not one of the differentiating factors of a network? A. Architecture B. Topology C. Protocols D. Telecommunication system
answer
D. Telecommunication system
question
What allows files containing text, programs, graphics, numerical data, and so on to be downloaded off or uploaded onto a network? A. File transfer protocol (FTP) B. Simple mail transfer protocol (SMTP) C. Hypertext transfer protocol (HTTP) D. Simple network management protocol (SNMP)
answer
A. File transfer protocol (FTP)
question
Which layer in the OSI model handles reliable delivery of packets between points on a network? A. Session layer B. Application layer C. Transport layer D. Presentation layer
answer
C. Transport layer
question
Which network topology is the simplest and cheapest to install and extend? A. Ring topology B. Bus topology C. Star topology D. Hybrid topology
answer
B. Bus topology
Accounting And Finance
Business Law
Cloud Computing
Digital Subscriber Line
Real Time Information
Supply Chain
Flashcards and Answers – MIS Chapter 8 25 terms

Ben Stevenson
25 terms
Preview
Flashcards and Answers – MIS Chapter 8
question
Forward integration
answer
takes information entered into a given system and sends it automatically to all downstream systems and processes
question
Backword integration
answer
Takes information entered into a given system and sends it automatically to all upstream systems and processes
question
enterprise systems
answer
Provide enterprise wide support and data access for a firm's operations and business processes
question
enterprise application integration (EAI)
answer
connects the plans, methods, and tools aimed at integrating separate enterprise systems
question
middleware
answer
Several different types of software that sit between and provide connectivity for two or more software applications
question
Enterprise application integration middleware
answer
takes a new approach to middleware by packaging commonly used applications together, reducing the time needed to integrate applications from multiple vendors
question
legacy system
answer
an old system that is fast approaching or beyond the end of its useful life within an organization
question
data integration
answer
Integration of data from multiple sources, which provides a unified view of all data
question
supply chain management (SCM)
answer
The management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability
question
effect and efficient supply chain management
answer
Can enable an organization to have these impacts on Porter's Five Forces Model: Decrease the power of buyers, increase its supplier power, increase buyers' switching costs to reduce the threat of substitute products or services, create entry barriers to reduce the threat of new entrants, increase efficiencies while seeking a competitive advantage through cost leadership
question
bullwhip effect
answer
occurs when distorted product demand information ripples from one partner to the next throughout the supply chain
question
supply chain visibility
answer
The ability to view all areas up and down the supply chain in real time
question
supply chain execution software
answer
ensure supply chain cohesion by automating the different activities of the supply chain
question
analytical CRM
answer
Supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers
question
operational CRM
answer
Supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers
question
cross-selling
answer
Selling additional products or services to an existing customer
question
up-selling
answer
Increasing the value of the sale
question
predictive dialing
answer
Automatically dials outbound calls and forwards answered calls to an available agent
question
ERP system
answer
Provide organizations with consistency- they allow for the effective controlling and planning of all resources required to plan, source, make, and deliver goods and services.
question
primary users of SCM system
answer
Customers, resellers, partners, suppliers, distributors
question
primary users of CRM system
answer
Sales, marketing, customer service
question
primary users of ERP system
answer
Accounting, finance, logistics, production
question
primary business benefits of SCM system
answer
Market demand, resource and capacity constraints, real-time scheduling
question
primary business benefits of CRM system
answer
Sales forecasts, sales strategies, marketing campaigns
question
primary business benefits of ERP system
answer
Forecasting, planning, purchasing, material management, warehousing, inventory, distribution