1,828
28
Essay, 7 pages (1800 words)

Is ch 7 – college essay

Telephone networks are fundamentally different from computer networks. t

Wikis allow visitors to change or add to the original posted material. t

An NOS must reside on a dedicated server computer in order to manage a network. f

A hub is a networking device that connects network components and is used to filter and forward data to specified destinations on the network. f

In a client/server network, a network server provides every connected client with an address so it can be found by others on the network. t

A computer network consists of at least three computers. f

Central large mainframe computing has largely replaced client/server computing. f

Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching. f

Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms. t

Over 80% of U. S. Internet users access the Internet via mobile devices. f

Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire. t

Fiber-optic cable is more expensive and harder to install than wire media. t

The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytef

The Domain Name System (DNS) converts IP addresses to domain names. f

VoIP technology delivers voice information in digital form using packet switching. t

Web 3. 0 is an effort to add a layer of meaning to the existing Web in order to reduce the amount of human involvement in searching for and processing Web information. t

In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks. t

TCP/IP was developed in the 1960s to enable university scientists to locate other computers on the Internet. f

Mobile search makes up 20% of all Internet searches. t

RFID technology is being gradually replaced by less costly technologies such as WSNs. f

The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n)A) hub. B) switch. C) router. D) NICB) switch.

The Internet is based on which three key technologies? A) TCP/IP, HTML, and HTTPB) TCP/IP, HTTP, and packet switchingC) client/server computing, packet switching, and the development of communications standards for linking networks and computersD) client/server computing, packet switching, and HTTPC) client/server computing, packet switching, and the development of communications standards for linking networks and computers

The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is calledA) multiplexing. B) packet switching. C) packetB) packet switching.

The telephone system is an example of a ________ network. A) peer-to-peerB) wirelessC) packet-switchedD) circuit-switchedD) circuit-switched

Which of the following is not a characteristic of packet switching? A) Packets travel independently of each other. B) Packets are routed through many different paths. C) Packet switching requires point-to-point circuits. D) Packets include data for checking transmission errors. C) Packet switching requires point-to-point circuits.

In TCP/IP, IP is responsible forA) disassembling and reassembling of packets during transmission. B) establishing an Internet connection between two computers. C) moving packets over the network. D) sequencing the transfer of packets. A) disassembling and reassembling of packets during transmission

In a telecommunications network architecture, a protocol isA) a device that handles the switching of voice and data in a local area network. B) a standard set of rules and procedures for control of communications in a network. C) a communications service for microcomputer users. D) the main computer in a telecommunications network. B) a standard set of rules and procedures for control of communications in a network. C

What are the four layers of the TCP/IP reference model? A) physical, application, transport, and network interfaceB) physical, application, Internet, and network interfaceC) application, transport, Internet, and network interfaceD) application, hardware, Internet, and network interfaceC) application, transport, Internet, and network interface

Which signal types are represented by a continuous waveform? A) laserB) opticalC) digitalD) analogD) analog

To use the analog telephone system for sending digital data, you must also use A) a modem. B) a router. C) DSL. D) twisted wireA) a modem.

Which type of network is used to connect digital devices within a half-mile or 500-meter radius? A) Wi-FiB) LANC) WAND) MANB) LAN

Which type of network treats all processors equally, and allows peripheral devices to be shared without going to a separate server? A) peer-to-peerB) wirelessC) LAND) Windows domain networkA) peer-to-peer

Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents? A) MANB) Domain-based LAN C) Peer-to-peer network D) WANC) Peer-to-peer network

WSNs are designed forA) connecting multiple wireless computing devices. B) monitoring the physical environment. C) increasing the reach of Wi-Fi networks. D) tracking the movement of goods in a supply chain. B) monitoring the physical environment.

All of the following are physical components of an RFID system except A) bar code. B) antenna. C) radio transmitters. D) tags. A) bar code.

Which digital cellular standard is used widely throughout the world except the United States? A) GSMB) CDMAC) WLAND) LTDA) GSM

A network that spans a city, and sometimes its major suburbs as well, is called a A) CAN. B) MAN. C) LAN. D) WAN. B) MAN.

A network that covers entire geographical regions is most commonly referred to as a(n) A) local area network. B) intranet. C) peer-to-peer network. D) wide area networkD) wide area network

The concept of a future Web in which it is commonplace for everyday objects to be connected, controlled or monitored over the Internet is calledA) the Web of things. B) the Semantic Web. C) Internet2. D) a 3-D WebA) the Web of things.

Bandwidth is theA) number of frequencies that can be broadcast through a medium. B) number of cycles per second that can be sent through a medium. C) difference between the highest and lowest frequencies that can be accommodated on a single channel. D) total number of bytes that can be sent through a medium per second. C) difference between the highest and lowest frequencies that can be accommodated on a single channel.

The total amount of digital information that can be transmitted through any telecommunications medium is measured inA) bps. B) Hertz. C) baud. D) gigaflops. A) bps.

Digital subscriber linesA) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are very-high-speed data lines typically leased from long-distance telephone companies. D) have up to twenty-four 64-Kbps channelsA) operate over existing telephone lines to carry voice, data, and video.

T1 linesA) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are high-speed, leased data lines providing guaranteed service levels. D) have up to twenty-four 64-Kbps channels. C) are high-speed, leased data lines providing guaranteed service levels.

Which protocol is the Internet based on? A) TCP/IPB) FTPC) packet-switchingD) HTTPA) TCP/IP

What service converts IP addresses into more recognizable alphanumeric names? A) HTMLB) DNSC) IPD) HTTPB) DNS

The child domain of the root is the A) top-level domain. B) second-level domain. C) host name. D) domain extensionA) top-level domain.

In the domain name “ http://books. azimuth-interactive. com”, which element is the second- level domain? A) booksB) azimuth-interactiveC) comD) none; there is no second-level domain in this nameB) azimuth-interactive

Which organization helps define the overall structure of the Internet? A) none (no one “ owns” the Internet)B) W3CC) ICANND) IABD) IAB

IPv6 is being developed in order toA) update the packet transmission protocols for higher bandwidth. B) create more IP addresses. C) allow for different levels of service. D) support Internet2. B) create more IP addresses.

Which of the following services enables logging on to one computer system and working on another? A) FTPB) World Wide WebC) newsgroupsD) telnetD) telnet

Instant messaging is a type of ________ service. A) chatB) cellularC) e-mailD) wirelessa

Which of the following statements about RFID is not true? A) RFIDs transmit only over a short range. B) RFIDs use an antenna to transmit data. C) Microchips embedded in RFIDs are used to store data. D) RFIDs require line-of-sight contact to be read. D) RFIDs require line-of-sight contact to be read.

_______ integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience. A) Wireless networksB) IntranetsC) Virtual private networksD) Unified communicationsD) Unified communications

A VPNA) is an encrypted private network configured within a public network. B) is more expensive than a dedicated network. C) provides secure, encrypted communications using Telnet. D) is an Internet-based service for delivering voice communications. A) is an encrypted private network configured within a public network.

Web browser software requests Web pages from the Internet using which protocol? A) URLB) HTTPC) DNSD) HTMLB) HTTP

Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n)A) uniform resource locator. B) IP address. C) third-level domain. D) root domain. A) uniform resource locator.

The most common Web server today, controlling 59 percent of the market, is A) Microsoft IIS. B) WebSTAR. C) Apache HTTP Server. D) Netscape ServerC) Apache HTTP Server.

What technology allows people to have content pulled from Web sites and fed automatically to their computers? A) FTPB) RSSC) HTTPD) BluetoothB) RSS

The process of employing techniques to help a Web site achieve a higher ranking with the major search engines is calledA) VPN. B) IAB. C) SEM. D) SEOD) SEO

Which of the following statements is not true about search engines? A) They are arguably the Internet’s “ killer app.” B) They have solved the problem of how users instantly find information on the Internet. C) They are monetized almost exclusively by search engine marketing. D) There are hundreds of search engines vying for user attention, with no clear leader having yet emergedD) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged

Which of the following is the first generation of cellular systems suitable for watching videos? A) 2GB) 2. 5GC) 3GD) 4GD) 4G

4G networks are also known as ________ networks. A) GSMB) CDMAC) LTDD) T-MobileC) LTD

The most appropriate wireless networking standard for creating PANs is A) I-mode. B) IEEE 802. 11b. C) Wi-Fi. D) Bluetooth. D) Bluetooth.

Bluetooth can be used to link up to ________ devices within a 10-meter area using low- power, radio-based communication. A) fourB) sixC) eightD) tenC) eight

Which process is used to protect transmitted data in a VPN? A) tunnelingB) PPPC) VOIPD) packet-switchingA) tunneling

One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to asA) touch points. B) hotspots. C) hot points. D) wireless hubs. B) hotspots.

The 802. 11 set of standards is known as A) WLAN. B) WSN. C) Wi-Fi. D) WiMaxC) Wi-Fi.

The WiMax standard can transmit up to a distance of approximately A) 30 meters. B) 500 meters. C) 30 miles. D) 5 miles. C) 30 miles.

Passive RFID tagsA) have their own power source. B) have a range of several feet. C) enable data to be rewritten and modified. D) are used in automated toll-collection systems. B) have a range of several feet.

Based on your reading of the examples in the chapter, what would be the best use of RFID for a business? A) logging transactionsB) managing the supply chainC) lowering network costsD) enabling client communicationB) managing the supply chain

Thank's for Your Vote!
Is ch 7 – college essay. Page 1
Is ch 7 – college essay. Page 2
Is ch 7 – college essay. Page 3
Is ch 7 – college essay. Page 4
Is ch 7 – college essay. Page 5
Is ch 7 – college essay. Page 6
Is ch 7 – college essay. Page 7
Is ch 7 – college essay. Page 8
Is ch 7 – college essay. Page 9

This work, titled "Is ch 7 – college essay" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Is ch 7 – college essay'. 21 September.

Reference

AssignBuster. (2022, September 21). Is ch 7 – college essay. Retrieved from https://assignbuster.com/is-ch-7-college-essay/

References

AssignBuster. 2022. "Is ch 7 – college essay." September 21, 2022. https://assignbuster.com/is-ch-7-college-essay/.

1. AssignBuster. "Is ch 7 – college essay." September 21, 2022. https://assignbuster.com/is-ch-7-college-essay/.


Bibliography


AssignBuster. "Is ch 7 – college essay." September 21, 2022. https://assignbuster.com/is-ch-7-college-essay/.

Work Cited

"Is ch 7 – college essay." AssignBuster, 21 Sept. 2022, assignbuster.com/is-ch-7-college-essay/.

Get in Touch

Please, let us know if you have any ideas on improving Is ch 7 – college essay, or our service. We will be happy to hear what you think: [email protected]