BIS CHAPTER 7

24 July 2022
4.7 (114 reviews)
115 test answers

Unlock all answers in this set

Unlock answers (111)
question
A local area network (LAN) spans a large geographic area such as a state, province, or country.
answer
FALSE
question
The Ironman Triathlon World Championship now uses WiMAX technology, which includes cameras strategically placed along the course for spectators, fans, and family to watch the athlete's performance.
answer
TRUE
question
Network convergence is the integration of communication channels into a single service.
answer
FALSE
question
A domain name system (DNS) converts IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions.
answer
TRUE
question
An intranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, Web publishing, and the support of business processes.
answer
TRUE
question
VPNs are often used to connect to a corporate server. VPN stands for a Valued Partner Network.
answer
FALSE
question
The three main benefits of networks or a connected world include sharing resources, providing opportunities, and reducing travel.
answer
TRUE
question
The main challenges facing networks include security, social, ethical and political issues
answer
TRUE
question
Two methods for encrypting network traffic on the Web are secure sockets layer and secure hypertext transfer protocol.
answer
TRUE
question
Secure sockets layer (SSL) is a combination of HTTP and SSL to provide encryption and secure identification of an Internet server.
answer
FALSE
question
Some of the social challenges with networking occur with newsgroups or blogs where like-minded people can exchange messages. Problems can arise when sensitive social issues become the topic of discussion such as politics or religion.
answer
TRUE
question
Mobile and wireless networks are identical and the terms can be used synonymously.
answer
FALSE
question
Wireless networking includes personal area networks (PAN) that provide communication over a short distance that is intended for use with devices that are owned and operated by a single user.
answer
TRUE
question
A wireless LAN (WLAN) is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves.
answer
FALSE
question
Worldwide Interoperability for Microwave Access (WiMAX) is a communications technology aimed at providing high-speed wireless data over metropolitan area networks.
answer
TRUE
question
Radio-frequency identification (RFID) uses electronic tags and labels to identify objects wirelessly over short distances.
answer
TRUE
question
RFID innovations and technologies are being used in many industries including retail, hospitals, pharmaceuticals, and ranchers.
answer
TRUE
question
A global positioning system (GPS) consists of hardware, software, and data that provide location information for display on a multidimensional map.
answer
FALSE
question
A great GIS example, Google earth, combines satellite imagery, geographic data, and Google's search capabilities to create a virtual globe that users can download to a computer or mobile device.
answer
TRUE
question
GPS utilizes location-based services (LBS), applications that use location information to provide a service, whereas a GIS does not use LBS applications.
answer
FALSE
question
Wireless networks offer many business advantages but can often slow employee productivity and workflow processes.
answer
FALSE
question
Enhancing mobility is one of the greatest advantages provided by wireless networks. It allows activities that were formerly tied to physical locations to be performed almost anywhere.
answer
TRUE
question
Instant access to customer profiles, account history, and current order status significantly improves the quality of interactions with customers, suppliers, and business partners.
answer
TRUE
question
Wireless technology offers the opportunity to redesign and often complicates the work flow processes to be faster, yet more expensive, and more time-consuming
answer
FALSE
question
One of the main challenges of business mobility is protecting against theft.
answer
TRUE
question
WLANs that use Wi-Fi have a built-in security mechanism called Wi-Fi protected access (WPA), a wireless security protocol to protect Wi-Fi networks.
answer
TRUE
question
LBS differ from RFID in that an LBS cannot track and monitor objects such as inventory
answer
FALSE
question
With the power of a wireless network, business professionals can take advantage of mobility allowing them to work from anywhere, at any time, using many different devices.
answer
TRUE
question
What enables telecommunications or the exchange of information (voice, text, data, audio, and video)? A. Computer networks B. Email C. HTML D. Technology sourcing
answer
A. Computer networks
question
What services do telecommunications offer? A. Telephone and cellular services B. Cable and satellite services C. Internet services D. All of the above
answer
D. All of the above
question
Which of the following includes the three primary network types? A. LAN, WAN, SAN B. LAN, WAN, MAN C. LAN, SAN, XAN D. LAN, WAN, XAN
answer
B. LAN, WAN, MAN
question
What is a large computer network usually spanning a city or a specific infrastructure like a college known as? A. Metropolitan area network (MAN) B. Local area network (LAN) C. Wide area network (WAN) D. Secure area network (SAN)
answer
A. Metropolitan area network (MAN)
question
What spans a large geographic area such as a state, province, or country, similar to the Internet? A. Metropolitan area network (MAN) B. Local area network (LAN) C. Wide area network (WAN) D. Secure area network (SAN)
answer
C. Wide area network (WAN)
question
What connects a group of computers in close proximity, such as in a school or office setting? A. Metropolitan area network (MAN) B. Local area network (LAN) C. Wide area network (WAN) D. Secure area network (SAN)
answer
B. Local area network (LAN)
question
What are the five elements that are needed to create a connected world or a network? A. Categories, programs, alternatives, people, and core philosophy B. Program, providers, access, mechanics, and teachers C. Categories, providers, access technologies, protocols, and convergence D. LAN, WAN, MAN, PAN, and SAN
answer
C. Categories, providers, access technologies, protocols, and convergence
question
LANs, WANs, and MANs all provide users with an accessible and reliable network infrastructure. Which of the below are the most important network differentiating dimensions? A. Reliability and timing B. Confidentiality and performance C. Security and cost D. Cost and performance
answer
D. Cost and performance
question
What is the largest and most important network that has evolved into a global information superhighway? A. Internet B. Intranet C. Extranet D. LAN
answer
A. Internet
question
Which of the below offers a common example of a LAN? A. College campus B. Home office C. City library D. All of the above
answer
D. All of the above
question
Which of the below offers an example of a WAN? A. The Internet B. Microsoft's main campus in Washington C. The city of Denver's court and police departments D. All of the above
answer
D. All of the above
question
Which of the below is not a LAN? A. Home office B. Business office C. College dorm room D. The Internet
answer
D. The Internet
question
The Internet is a hierarchical structure linking different levels of service providers whose millions of devices supply all the interconnections. The three levels outlined in the book from the top down include ____________________. A. New system provider (NSP), Current system provider (CSP), and Order entry system provider (OSP) B. National service provider (NSP), Regional service provider (RSP), and Internet service provider (ISP) C. Net server point (NSP), Radio server point (RSP), and Internet server point (ISP) D. None of the above
answer
B. National service provider (NSP), Regional service provider (RSP), and Internet service provider (ISP)
question
NSPs are private companies that own and maintain the worldwide backbone that supports the Internet. Which of the below is not an NSP? A. Sprint B. Verizon C. Microsoft D. AT&T
answer
C. Microsoft
question
Which of the below is not a major ISP in the United States? A. Earthlink B. NetZero C. Comcast D. Apple
answer
D. Apple
question
What measures network performance by the maximum amount of data that can pass from one point to another in a unit of time? A. Bandwidth B. Frequency C. Access D. Protocol
answer
A. Bandwidth
question
The speed of transmission of a network is determined by the speed of its smallest _____________. A. Unit of time B. Number of computers C. Amount of bandwidth D. Number of customers
answer
C. Amount of bandwidth
question
What is a device that enables a computer to transmit and receive data? A. Broadband B. Modem C. Bandwidth D. ISP
answer
B. Modem
question
Which of the following terms refers to the smallest element of data and has a value of either 0 or 1? A. Bit B. Bandwidth C. Modem D. Internet protocol
answer
A. Bit
question
What measures bandwidth in terms of numbers transferred or received per unit of time? A. Connection time B. Broadband C. Protocol D. Bit rate
answer
D. Bit rate
question
What is a high-speed Internet connection that is always connected and has a bandwidth greater than 2 Mbps? A. Analog B. Dial up C. Broadband D. None of the above
answer
C. Broadband
question
What are the two most prevalent types of broadband access? A. Data subscriber and cable connection B. Digital subscriber line and cable connection C. Digital line and client line D. Digital server and client server
answer
B. Digital subscriber line and cable connection
question
Which of the following allows high-speed digital data transmission over standard telephone lines? A. Digital subscriber line (DSL) B. Data subscription service (DSS) C. Dominance service line (DSL) D. Data converter input (DCI)
answer
A. Digital subscriber line (DSL)
question
Which of the following provides Internet access using a cable television company's infrastructure and a special cable modem? A. ISP cable box B. Internet cable connection C. Satellite cable box D. Satellite cable connection
answer
B. Internet cable connection
question
Which of the below allows a user to access the Internet? A. Dial-up connection B. Cable C. T1 line D. All of the above
answer
D. All of the above
question
Which of the following is a type of data connection able to transmit a digital signal at 1.544 Mpbs and is more expensive and reliable than cable or DSL? A. T1 line B. Dial-up line C. Modem line D. All of the above
answer
A. T1 line
question
What is the standard that specifies the format of data as well as the rules to be followed during transmission? A. Bandwidth B. Bit rate C. Protocol D. Transmission record
answer
C. Protocol
question
What is the standard Internet protocol, which provides the technical foundation for the public Internet? A. Data streaming and DSL protocols B. Transmission control protocol/Internet protocol (TCP/IP) C. Data streaming rules and regulations D. Internet protocol/Transmission control protocol (IP/TCP)
answer
B. Transmission control protocol/Internet protocol (TCP/IP)
question
How do TCP and IP differ? A. TCP verifies the correct delivery of data in case it is corrupted, where IP verifies the data are sent to the correct IP address B. TCP verifies the information is reliable, and IP verifies that the data is sent C. IP verifies the correct delivery of data in case it is corrupted, where TCP verifies the data are sent to the correct IP address D. IP verifies connectivity, and TCP verifies the rate at which the data is sent
answer
A. TCP verifies the correct delivery of data in case it is corrupted, where IP verifies the data are sent to the correct IP address
question
What is the conversion of IP addresses that identifies labels that use a variety of recognizable naming conventions? A. Domain grades B. URL spaces C. Domain national sequences (DNS) D. Domain name system (DNS)
answer
D. Domain name system (DNS)
question
Which domain is reserved for U.S. government agencies? A. .info B. .USA C. .gov D. .US
answer
C. .gov
question
Which domain is the most common and reserved for commercial organizations and businesses? A. .net B. .com C. .biz D. .org
answer
B. .com
question
Which domain is reserved for accredited postsecondary institutions? A. .mil B. .edu C. .biz D. .org
answer
B. .edu
question
Which domain is reserved for the U.S. military? A. .mil B. .gov C. .org D. .age
answer
A. .mil
question
What is the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures? A. Network protocol B. Networking category C. Network convergence D. Network communication
answer
C. Network convergence
question
What is a benefit of network convergence? A. The weaving together of voice, data, and video B. Multiple services offered from a single vendor C. Multiple devices supported by one provider D. All of the above
answer
D. All of the above
question
What is the integration of communication channels into a single service? A. Instant communication B. Unified communication C. Peer-to-peer communication D. Voice over communication
answer
B. Unified communication
question
What is VoIP? A. VoIP uses IP technology to transmit telephone calls B. VoIP offers the low cost ability to receive personal and business calls via computer C. VoIP offers the ability to have more than one phone number D. VoIP offers all of the above
answer
D. VoIP offers all of the above
question
What is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server? A. Peer-to-peer (P2P) B. Voice over IP (VoIP) C. Internet protocol TV (IPTV) D. All of the above
answer
A. Peer-to-peer (P2P)
question
Which of the below is an example of P2P? A. GoDaddy B. Skype C. Federal Communication Commission (FCC) D. Facebook
answer
B. Skype
question
Which statement below is inaccurate in reference to domain names? A. Domain names are rented B. Domain names are owned C. Domain names are renewable D. GoDaddy is a popular domain name registrar
answer
B. Domain names are owned
question
What can unified communications merge? A. IMing B. Videoconferencing C. Voice Mail D. All of the above
answer
D. All of the above
question
Which of the below statements is inaccurate in reference to unified communications? A. UC decreases communication costs B. UC enhances the way individuals communicate C. UC enhances the way individuals collaborate D. UC increases communication expenses
answer
D. UC increases communication expenses
question
. VoIP allows users to _____________. A. Call anyone with a local telephone number B. Call anyone with an international telephone number C. Call anyone with a cellular telephone number D. All of the above
answer
D. All of the above
question
What is a benefit of VoIP? A. Lowers costs B. Clear connection C. Higher expenses D. All of the above
answer
A. Lowers costs
question
What distributes digital video content using IP across the Internet and private IP networks? A. Internet broadband policy network B. Internet protocol TV (IPTV) C. Internet Television Interactivity (ITVI) D. Internet television personalization
answer
B. Internet protocol TV (IPTV)
question
What is a feature of IPTV? A. IPTV uses low bandwidth B. IPTV offers personalization C. IPTV supports multiple devices D. All of the above
answer
D. All of the above
question
What is a disadvantage of networking or performing business in a connected world? A. Reduces travel and expenses B. Provides opportunities C. Shares resources D. Increases resource threats
answer
D. Increases resource threats
question
Which benefits of a connected world makes all applications, equipment (such as a high-volume printer), and data available to anyone on the network, without regard to the physical location of the resource or the user? A. Sharing resources B. Providing opportunities C. Reducing travel D. All of the above
answer
A. Sharing resources
question
What is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, and web publishing? A. National ISP B. Regional ISP C. Intranet D. Extranet
answer
C. Intranet
question
What is an extension of an Intranet that is available only to authorized outsiders? A. National ISP B. Regional ISP C. Intranet D. Extranet
answer
D. Extranet
question
An extranet is not available for use by a ______________. A. Customer B. Supplier C. Employee D. Competitor
answer
D. Competitor
question
What is a VPN? A. A direct network provider using a company server B. A direct private network that creates a "private tunnel" within the Internet to connect to the corporate server C. A direct URL that creates a private tunnel for a company D. A direct P2P that creates an open access community for a company
answer
B. A direct private network that creates a "private tunnel" within the Internet to connect to the corporate server
question
Why would a company use an Intranet? A. Intranets are used for business operations and management B. Intranets are used for communications and collaboration C. Intranets are used for Web publishing D. All of the above
answer
D. All of the above
question
What is the major challenge of networking or performing business in a connected world? A. Personal issues B. Society demands C. Security issues D. Telecommuting demands
answer
C. Security issues
question
What are the two main methods for encrypting network traffic on the Web? A. SSL and HTTP B. SSL and SHTTP C. DSL and HTTP D. HTML and SHTTP
answer
B. SSL and SHTTP
question
What is a combination of HTTP and SSL that provides encryption and secure identification of an Internet server? A. Secure hypertext transfer protocol (SHTTP) B. Secure sockets layer (SSL) C. SSL certificate D. SHTTP certificate
answer
A. Secure hypertext transfer
question
To create an SSL connection, a Web server requires a _____________, which is an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company. A. DSL Degree B. SSL Degree C. SSL Certificate D. DSL Certificate
answer
C. SSL Certificate
question
What is the worldwide gap giving advantage to those with access to technology? A. Digital subscriber B. Digital divide C. Digital Darwinism D. Digital era
answer
B. Digital divide
question
What are the four wireless communication network categories? A. Private servers, company servers, government servers, and international servers B. Protocol, land lines, rates, and worldwide C. Personal, local, regional, and international D. Personal area networks, wireless local area networks, wireless metropolitan area networks, and wireless wide area networks
answer
D. Personal area networks, wireless local area networks, wireless metropolitan area networks, and wireless wide area networks
question
Which of the following is not a type of wireless network? A. PAN B. WLAN C. WWAN D. MAN
answer
D. MAN
question
Which of the below statements is not accurate in reference to mobile and wireless computing? A. Mobile technology can travel with the user B. Wireless technology is any type of operation accomplished without the use of a hard-wired connection C. Wireless technology is any type of operation accomplished with the use of a hard-wired connection D. Mobile technology allows a user to download software to a laptop or cell phone for portable reading or reference
answer
C. Wireless technology is any type of operation accomplished with the use of a hard-wired connection
question
What is the digital divide? A. A worldwide gap giving advantage to those with access to technology B. A data interruption in the Internet connection C. A deficiency in school-aged children with computer knowledge D. A divide between the economies of third world countries
answer
A. A worldwide gap giving advantage to those with access to technology
question
What is the worldwide gap giving advantage to those with access to technology? A. Digital subscriber B. Digital divide C. Digital Darwinism D. Digital era
answer
B. Digital divide
question
What is a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices? A. Laptop B. PDA C. Bluetooth D. Camera
answer
C. Bluetooth
question
Which network uses radio signals to transmit and receive data over distances of a few hundred feet? A. WMAN B. WWAN C. PAN D. WLAN
answer
D. WLAN
question
What is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves? A. Bluetooth B. Wireless fidelity (WI-FI) C. Wide area network (WAN) D. Wireless data centers
answer
B. Wireless fidelity (WI-FI)
question
What are areas around access points where users can connect to the Internet via WI-FI? A. Hotspots B. Cafรฉ or coffee shop C. Company break rooms D. Warmspots
answer
A. Hotspots
question
The bandwidths associated with Wi-Fi are separated according to several wireless networking standards, known as __________, for carrying out wireless local area network communication. A. Bits B. 802.11 C. 80118091 D. 91210
answer
B. 802.11
question
A wireless MAN (WMAN) is a metropolitan area network that uses ___________ to transmit and receive data. A. WI-FI ideas B. STP technology C. Cable connections D. Radio signals
answer
D. Radio signals
question
What does the wireless technology WiMAX stand for? A. Worldwide Interoperability for Microwave Access B. World Interconnected through Mobile Awareness C. World Interorganizations for Mobile Access D. Wide International for Misinformation Access
answer
A. Worldwide Interoperability for Microwave Access
question
A wireless WAN (WWAN) is a wide area network that uses radio signals to transmit and receive data and can be divided into which two categories? A. Cellular communications and multiple user communication systems B. Mobile and wireless technologies C. Cellular and satellite communication systems D. Client and server systems
answer
C. Cellular and satellite communication systems
question
Cell phones have morphed into _________ __________ that offer more advanced computing ability and connectivity than basic cell phones. A. Micro computers B. Smart phones C. Streaming phones D. Super computers
answer
B. Smart phones
question
What is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred? A. Streaming B. Streamlining C. Networking D. Wireless
answer
A. Streaming
question
What is a space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area? A. GPS B. Satellite C. GIS D. LBS
answer
B. Satellite
question
What are satellite communications used for? A. Cell phones B. Mobile base stations C. Satellite dish receivers D. All of the above
answer
D. All of the above
question
Which of the below is experiencing rapid growth due to wireless technology? A. RFID B. GPS C. GIS D. All of the above
answer
D. All of the above
question
Which business application uses electronic tags and labels to identify objects wirelessly over short distances? A. Radio-frequency identification B. Global positioning systems C. Geographic information systems D. Location-based services
answer
A. Radio-frequency identification
question
Which business application uses location information to provide a service and is designed to give mobile users instant access to personalized local content? A. Radio-frequency identification B. Global positioning systems C. Geographic information systems D. Location-based services
answer
D. Location-based services
question
Which business application is a satellite-based navigation system providing extremely accurate position, time, and speed information? A. Radio-frequency identification B. Global positioning systems C. Geographic information systems D. Location-based services
answer
B. Global positioning systems
question
Which business application consists of hardware, software, and data that provide location information for display on a multidimensional map? A. Radio-frequency identification B. Global positioning systems C. Geographic information systems D. Location-based services
answer
C. Geographic information systems
question
Which of the following is not a primary use of GIS? A. Finding what is nearby from a specific location B. Mapping densities C. Routing information D. Ensuring safety equipment is on an airplane before a flight.
answer
D. Ensuring safety equipment is on an airplane before a flight.
question
Which of the below uses both GIS and GPS? A. Navigation B. Wireless advertising C. Vehicle location D. All of the above
answer
D. All of the above
question
Which social media site uses LBS? A. Foursquare B. iTunes C. Google D. YouTube
answer
A. Foursquare
question
________ is a security protocol that protects Wi-Fi networks. A. Wireless prevention policy B. Wi-Fi protected access C. Wireless security regulations D. Wi-Fi technology port
answer
B. Wi-Fi protected access
question
The potential for contracting viruses on mobile devices is increasing; in fact, the first known mobile phone virus was called _____________. A. Cabir B. Cadet C. Capital D. Caviar
answer
A. Cabir
question
Which of the following is a measure being considered to address privacy concerns with RFIDs and LBSs? A. Clearly labeled RFID tags on products B. Kill codes C. RSA Blocker Tags D. All of the above
answer
D. All of the above