MIS Chapter 7

25 July 2022
4.7 (114 reviews)
88 test answers

Unlock all answers in this set

Unlock answers (84)
question
1) Which of the following is a device that acts as a connection point between computers and can filter and forward data to a specified destination? A) Hub B) Switch C) Router D) NIC E) Modem
answer
B
question
2) The Internet is based on which three key technologies? A) TCP/IP, HTML, and HTTP B) TCP/IP, HTTP, and packet switching C) Client/server computing, packet switching, and the development of communications standards for linking networks and computers D) Client/server computing, packet switching, and HTTP E) E-mail, instant messaging, and newsgroups
answer
C
question
3) Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations? A) Multiplexing B) Packet shifting C) Packet routing D) ATM E) Packet switching
answer
E
question
4) The telephone system is an example of a ________ network. A) peer-to-peer B) wireless C) packet-switched D) circuit-switched E) client/server
answer
D
question
5) Which of the following is not a characteristic of packet switching? A) Packets travel independently of each other. B) Packets are routed through many different paths. C) Packet switching requires point-to-point circuits. D) Packets include data for checking transmission errors. E) Packets are reassembled into the original message when they reach their destinations.
answer
C
question
6) In TCP/IP, IP is responsible for which of the following? A) Disassembling and reassembling packets during transmission B) Establishing an Internet connection between two computers C) Moving packets over the network D) Sequencing the transfer of packets E) Breaking messages down into packets
answer
A
question
7) Which of the following is the best description of a protocol in a telecommunications network architecture? A) A device that handles the switching of voice and data in a local area network B) A standard set of rules and procedures for control of communications in a network C) A communications service for microcomputer users D) The main computer in a telecommunications network E) A pathway through which packets are routed
answer
B
question
8) What are the four layers of the TCP/IP reference model? A) Physical, application, transport, and network interface B) Physical, Application, Internet, and Network Interface C) Application, Transport, Internet, and Network Interface D) Application, Hardware, Internet, and Network Interface E) Software, Hardware, Network Interface, Internet
answer
C
question
9) On which of the following protocols is the Internet based? A) TCP/IP B) FTP C) IMAP D) HTTP E) DNS
answer
A
question
10) A(n) ________ is a device that forwards packets of data through different networks, ensuring that the data gets to the right address. A) modem B) router C) packet D) telnet E) hub
answer
B
question
11) Computer networks are fundamentally different from telephone networks. A) TRUE B) FALSE
answer
A
question
12) A NOS must reside on a dedicated server computer in order to manage a network. A) TRUE B) FALSE
answer
B
question
13) A hub is a networking device that is used to filter and forward data to specified destinations on the network. A) TRUE B) FALSE
answer
B
question
14) In a client/server network, a network server provides every connected client with an address so it can be found by others on the network. A) TRUE B) FALSE
answer
A
question
15) A computer network consists of at least three computers. A) TRUE B) FALSE
answer
B
question
16) Central large mainframe computing has largely replaced client/server computing. A) TRUE B) FALSE
answer
B
question
17) Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching. A) TRUE B) FALSE
answer
B
question
18) Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms. A) TRUE B) FALSE
answer
A
question
19) In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks. A) TRUE B) FALSE
answer
A
question
20) TCP/IP was developed during the early 1970s to support efforts to help scientists transmit data among different types of computers over long distances. A) TRUE B) FALSE
answer
A
question
24) Which signal types are represented by a continuous waveform? A) Laser B) Optical C) Digital D) RFID E) Analog
answer
E
question
25) To use the analog telephone system for sending digital data, you must also use: A) a modem. B) a router. C) DSL. D) twisted wire. E) TCP/IP.
answer
A
question
26) Which type of network is used to connect digital devices within a half-mile or 500-meter radius? A) Wi-Fi B) LAN C) WAN D) MAN E) SAN
answer
B
question
27) Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server? A) MAN B) Wireless C) LAN D) Windows domain network E) Peer-to-peer
answer
E
question
28) Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents? A) MAN B) Domain-based LAN C) Peer-to-peer network D) WAN E) SAN
answer
C
question
29) A network that spans a city, and sometimes its major suburbs, as well, is called a: A) CAN. B) MAN. C) LAN. D) WAN. E) WSN.
answer
B
question
30) A network that covers entire geographical regions is most commonly referred to as a(n): A) local area network. B) intranet. C) peer-to-peer network. D) wide area network. E) metropolitan area network.
answer
D
question
31) Bandwidth is the: A) number of frequencies that can be broadcast through a medium. B) number of cycles per second that can be sent through a medium. C) difference between the highest and lowest frequencies that can be accommodated on a single channel. D) total number of bytes that can be sent through a medium per second. E) geographical distance spanned by a network.
answer
C
question
32) The total amount of digital information that can be transmitted through any telecommunications medium is measured in: A) bps. B) Hertz. C) baud. D) gigaflops. E) RPMs.
answer
A
question
33) A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits. A) modulated B) broadband C) T1 D) analog E) digital
answer
E
question
34) Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire. A) TRUE B) FALSE
answer
A
question
35) Fiber-optic cable is more expensive and harder to install than wire media. A) TRUE B) FALSE
answer
A
question
36) The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes. A) TRUE B) FALSE
answer
B
question
37) You have been hired by a small new web design firm to set up a network for its single office location. The network is primarily needed for exchanging files, accessing and managing beta websites on their web server, and connecting to the Internet. The firm hires many freelancers who come into the office on an ad-hoc basis and it does not have a lot of money to spend on infrastructure. What type of network will you recommend? Short Answer:
answer
I would recommend a mixed wired and wireless network. The wired LAN would connect the web servers and primary workstations and connect via cable service to the Internet. Freelancers could connect wirelessly via access points.
question
38) What are the two types of signals used to communicate a message in a network and how are they different? What device converts one type to the other type? Short Answer:
answer
The two ways to communicate a message in a network are analog signals and digital signals. An analog signal is represented by a continuous waveform that passes through a communications medium and is used for voice communication. Examples include the telephone handset and other types of speakers that generate analog sound. On the other hand, digital signals are binary waveforms (not continuous) that communicate information as strings of two discrete states: one bit or zero bits (often depicted as strings of zeroes and ones). Computers use these types of signals and use modems to convert digital signals to analog signals.
question
40) Which of the following is not one of the top five search engines? A) Facebook B) Yahoo C) Microsoft Bing D) Ask E) Google
answer
A
question
41) Digital subscriber lines: A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial cable lines to deliver Internet access. C) are very-high-speed data lines typically leased from long-distance telephone companies. D) have up to twenty-four 64-Kbps channels. E) are assigned to every computer on the Internet.
answer
A
question
42) T1 lines: A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) do not provide guaranteed service levels, but simply "best effort." D) have up to twenty-four 64-Kbps channels. E) are high-speed, leased data lines providing guaranteed service levels.
answer
E
question
43) What service converts IP addresses into more recognizable alphanumeric names? A) HTML B) FTP C) IP D) HTTP E) DNS
answer
E
question
44) The child domain of the root is called the: A) top-level domain. B) second-level domain. C) host name. D) domain extension. E) mid-tier domain.
answer
A
question
45) In the domain name "http://books.azimuth-interactive.com", which element is the second-level domain? A) books B) azimuth-interactive.com C) com D) none; there is no second-level domain in this name E) books.azimuth-interactive
answer
B
question
46) Which organization helps define the overall structure of the Internet? A) none (no one "owns" the Internet) B) W3C C) ICANN D) The Department of Commerce (U.S.) E) IAB
answer
E
question
47) IPv6 has been developed in order to: A) update the packet transmission protocols for higher bandwidth. B) create more IP addresses. C) allow for different levels of service. D) support Internet2. E) reduce excess IP addresses. business?
answer
B
question
48) Predictive search in Google's search engine: A) maintains a history of your searches and then predicts what you will search on next. B) uses a tracking service and cookies on your browser to predict search results. C) uses a knowledge graph of what similar people searched on to predict your search interests. D) uses a semantic approach to predict what you are looking for. E) predicts what you are looking for as you enter words into the query box.
answer
E
question
49) Instant messaging is a type of ________ service. A) chat B) cellular C) e-mail D) wireless E) network
answer
A
question
50) ________ integrate disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience. A) Wireless networks B) Intranets C) Virtual private networks D) Modems E) Unified communications
answer
E
question
51) A VPN: A) is an encrypted private network configured within a public network. B) is more expensive than a dedicated network. C) provides secure, encrypted communications using Telnet. D) is an Internet-based service for delivering voice communications. E) is a proprietary networking service technology developed by individual corporations.
answer
A
question
52) Web browser software requests web pages from the Internet using which of the following protocols? A) URL B) HTTP C) DNS D) HTML E) FTP
answer
B
question
53) Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): A) uniform resource locator. B) IP address. C) third-level domain. D) root domain. E) child domain.
answer
A
question
54) The most common web server today is: A) Microsoft IIS. B) WebSTAR. C) IBM HTTP Server. D) Netscape Server. E) Apache HTTP Server.
answer
E
question
55) Which of the following pulls content from websites and feeds it automatically to a user's computers? A) FTP B) RSS C) HTTP D) Bluetooth E) IPv6
answer
B
question
56) Which of the following can be used to help a website achieve a higher ranking with the major search engines? A) VPN B) IAB C) SEM D) SEO E) RSS
answer
D
question
57) Which of the following statements is not true about search engines? A) They are arguably the Internet's "killer app." B) They have solved the problem of how users instantly find information on the Internet. C) They are monetized almost exclusively by search engine marketing. D) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged. E) Users are increasingly using search engines on mobile devices.
answer
D
question
58) Which process is used to protect transmitted data in a VPN? A) Tunneling B) PPP C) VOIP D) Packet-switching E) Chaining
answer
A
question
59) ________ monetizes the value of the data stored by search engines. A) TCP/IP B) RSS C) WiMax D) IoT E) Search Engine Marketing
answer
E
question
60) Shopping bots use ________ software for searching the Internet. A) Web 2.0 B) Web 3.0 C) intelligent agent D) comparison E) SEO
answer
C
question
61) Which of the following is not a defining feature of Web 2.0? A) Interactivity B) Real-time user control C) Semantic search D) Social participation (sharing) E) User-generated content
answer
C
question
62) A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers. A) RSS B) WAN C) NFP D) ISP E) FTP
answer
D
question
63) The backbone networks of the Internet are typically owned by long-distance telephone companies called: A) regional network providers. B) enhanced service providers. C) internet bulk providers. D) backbone providers. E) network service providers.
answer
E
question
64) A(n) ________ is software for locating and managing stored web pages. A) web server B) net server C) router D) modem E) hub
answer
A
question
65) More than 200 million Americans access the Internet via mobile devices. A) TRUE B) FALSE
answer
A
question
66) Wikis allow visitors to change or add to the original posted material. A) TRUE B) FALSE
answer
A
question
67) The Domain Name System (DNS) converts domain names to IP addresses. A) TRUE B) FALSE
answer
A
question
68) VoIP technology delivers voice information in digital form using packet switching. A) TRUE B) FALSE
answer
A
question
69) Web 3.0 is an effort to add a layer of meaning to the existing web in order to reduce the amount of human involvement in searching for and processing web information. A) TRUE B) FALSE
answer
A
question
70) Mobile search makes up at more than 50% of all Internet searches. A) TRUE B) FALSE
answer
A
question
71) The "Internet of Things" refers to a vision of a pervasive Web, in which common objects are connected to and controlled over the Internet. A) TRUE B) FALSE
answer
A
question
72) Digital rights activists believe "zero-rating" practices violate net neutrality principles. A) TRUE B) FALSE
answer
A
question
73) In addition to being an online retailer, Amazon is also a powerful search engine. A) TRUE B) FALSE
answer
A
question
74) The emerging Internet of People is based on sensors attached to clothing and personal effects that monitor physical states and locations of individuals. A) TRUE B) FALSE
answer
A
question
81) All of the following are physical components of an RFID system except: A) bar codes. B) antennas. C) radio transmitters. D) tags. E) a stationary or handheld device.
answer
A
question
82) Which digital cellular standard is used widely throughout the world except the United States? A) GSM B) CDMA C) WLAN D) LTD E) 4G
answer
A
question
83) The concept of a future web in which it is commonplace for everyday objects to be connected, controlled or monitored over the Internet is called: A) the Internet of Things. B) the Semantic Web. C) Internet2. D) a 3-D Web. E) Web 2.0.
answer
A
question
84) Which of the following statements about RFID is not true? A) RFIDs transmit only over a short range. B) RFIDs use an antenna to transmit data. C) Microchips embedded in RFIDs are used to store data. D) RFIDs require line-of-sight contact to be read. E) RFID tags and antennas come in a variety of shapes and sizes.
answer
D
question
85) Which of the following is the first generation of cellular systems suitable for watching videos? A) 2G B) 2.5G C) 3G D) 3.5G E) 4G
answer
E
question
86) 4G networks use which of the following standards? A) GSM and LTD B) CDMA and PAN C) LTE and LTD D) T-Mobile and AT&T E) LTE and WiMax
answer
E
question
87) The most appropriate wireless networking standard for creating PANs is: A) I-mode. B) IEEE 802.11b. C) Wi-Fi. D) Bluetooth. E) RFID.
answer
D
question
88) Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication. A) two B) five C) eight D) fifteen E) twenty
answer
C
question
89) One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as: A) touch points. B) netcenters. C) hot points. D) wireless hubs. E) hotspots.
answer
E
question
90) The 802.11 set of standards is known as: A) WLAN. B) WSN. C) Wi-Fi. D) WiMax. E) WAN.
answer
C
question
91) The WiMax standard can transmit up to a distance of approximately: A) 30 meters. B) 500 meters. C) 30 miles. D) 5 miles. E) 70 miles.
answer
C
question
92) Based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business? A) Logging transactions B) Managing the supply chain C) Lowering network costs D) Enabling client communication E) Improving employee engagement
answer
B
question
93) Macy's Pick to the Last Unit system, described in the chapter-opening case, is an example of which of the following? A) IoT application B) IoP application C) BLE application D) GPS application E) Web 3.0 application
answer
A
question
94) A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub. A) RFID receiver B) WiMax receiver C) access point D) hub E) hotspot
answer
C
question
95) RFID technology is being gradually replaced by less costly technologies such as WSNs. A) TRUE B) FALSE
answer
B
question
96) Apple Pay uses an RFID-related technology called near field communication. A) TRUE B) FALSE
answer
A
question
97) NFC tags are always passive. A) TRUE B) FALSE
answer
B
question
In TCP/IP, IP is responsible for which of the following? A) Disassembling and reassembling packets during transmission B) Establishing an Internet connection between two computers C) Moving packets over the network D) Sequencing the transfer of packets E) Breaking messages down into packets
answer
a