Save
Busy. Please wait.
Log in using Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't know
Remaining cards (0)
Know
0:00
share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

IS 7

Multiple Choice

QuestionAnswer
Which of the following is a device that acts as a connection point between computers and can filter and forward data to a specified destination? A) Hub B) Switch C) Router D) NIC E) Modem Switch
The Internet is based on which three key technologies? A) TCP/IP, HTML, and HTTP B) TCP/IP, HTTP, and packet switching C) Client/server computing, packet switching, and the development of communications standards for linking networks and computers D) Client/server computing, packet switching, and HTTP E) E-mail, instant messaging, and newsgroups Client/server computing, packet switching, and the development of communications standards for lining networks and computers
Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations? A) Multiplexing B) Packet shifting C) Packet routing D) ATM. E) Packet switching E
The telephone system is an example of a ________ network. A) peer-to-peer B) wireless C) packet-switched D) circuit-switched E) client/server D
Which of the following is not a characteristic of packet switching? A) Packets travel independently of each other. B) Packets are routed through many different paths. C) Packet switching requires point-to-point circuits. D) Packets include data for checking transmission errors. E) Packets are reassembled into the original message when they reach their destinations. C
In TCP/IP, IP is responsible for which of the following? A) Disassembling and reassembling packets during transmission B) Establishing an Internet connection between two computers C) Moving packets over the network D) Sequencing the transfer of packets E) Breaking messages down into packets A
Which of the following is the best description of a protocol in a telecommunications network architecture? A) A device that handles the switching of voice and data in a local area network B) A standard set of rules and procedures for control of communications in a network C) A communications service for microcomputer users D) The main computer in a telecommunications network E) A pathway through which packets are routed B
What are the four layers of the TCP/IP reference model? A) Physical, application, transport, and network interface B) Physical, application, Internet, and network interface C) Application, transport, Internet, and network interface D) Application, hardware, Internet, and network interface E) Software, hardware, network interface, Internet C
On which of the following protocols is the Internet based? A) TCP/IP B) FTP C) IMAP D) HTTP E) DNS A
A(n) ________ is a device that forwards packets of data through different networks, ensuring that the data gets to the right address. A) modem B) router C) packet D) telnet E) hub B
Which signal types are represented by a continuous waveform? A) Laser B) Optical C) Digital D) RFID E) Analog E
To use the analog telephone system for sending digital data, you must also use: A) a modem. B) a router. C) DSL. D) twisted wire. E) TCP/IP. A
Which type of network is used to connect digital devices within a half-mile or 500-meter radius? A) Wi-Fi B) LAN C) WAN D) MAN E) SAN B
Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server? A) MAN B) Wireless C) LAN D) Windows domain network E) Peer-to-peer E
Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents? A) MAN B) Domain-based LAN C) Peer-to-peer network D) WAN E) SAN C
A network that spans a city, and sometimes its major suburbs, as well, is called a: A) CAN. B) MAN. C) LAN. D) WAN. E) WSN. B
A network that covers entire geographical regions is most commonly referred to as a(n): A) local area network. B) intranet. C) peer-to-peer network. D) wide area network. E) MAN. D
Bandwidth is the: A) number of frequencies that can be broadcast through a medium. B) number of cycles per second that can be sent through a medium. C) difference between the highest and lowest frequencies that can be accommodated on a single channel. D) total number of bytes that can be sent through a medium per second. E) geographical distance spanned by a network. C
The total amount of digital information that can be transmitted through any telecommunications medium is measured in: A) bps. B) Hertz. C) baud. D) gigaflops. E) RPMs. A
A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits. A) modulated B) broadband C) T1 D) analog E) digital E
Which of the following is not one of the top five search engines? A) Facebook B) Yahoo C) Microsoft Bing D) Ask E) Google A
Digital subscriber lines: A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial cable lines to deliver Internet access. C) are very-high-speed data lines typically leased from long-distance telephone companies. D) have up to twenty-four 64-Kbps channels. E) are assigned to every computer on the Internet. A
T1 lines: A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) do not provide guaranteed service levels, but simply "best effort." D) have up to twenty-four 64-Kbps channels. E) are high-speed, leased data lines providing guaranteed service levels. E
What service converts IP addresses into more recognizable alphanumeric names? A) HTML B) FTP C) IP D) HTTP E) DNS E
The child domain of the root is called the: A) top-level domain. B) second-level domain. C) host name. D) domain extension. E) mid-tier domain. A
In the domain name " which element is the second-level domain? A) books B) azimuth-interactive C) com D) none; there is no second-level domain in this name E) books. azimuth-interactive B
Which organization helps define the overall structure of the Internet? A) none (no one "owns" the Internet) B) W3C C) ICANN D) The Department of Commerce (U.S.) E) IAB E
IPv6 has been developed in order to: A) update the packet transmission protocols for higher bandwidth. B) create more IP addresses. C) allow for different levels of service. D) support Internet2. E) reduce excess IP addresses. B
Predictive search in Google's search engine: A) maintains a history of your searches and then predicts what you will search on next. B) uses a tracking service and cookies on your browser to predict search results. C) uses a knowledge graph of what similar people searched on to predict your search interests. D) uses a semantic approach to predict what you are looking for. E) predicts what you are looking for as you enter words into the query box E
Instant messaging is a type of ________ service. A) chat B) cellular C) e-mail D) wireless E) network A
________ integrate disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience. A) Wireless networks B) Intranets C) Virtual private networks D) Modems E) Unified communications E
A VPN: A) is an encrypted private network configured within a public network. B) is more expensive than a dedicated network. C) provides secure, encrypted communications using Telnet. D) is an Internet-based service for delivering voice communications. E) is a proprietary networking service technology developed by individual corporations. A
Web browser software requests web pages from the Internet using which of the following protocols? A) URL B) HTTP C) DNS D) HTML E) FTP B
Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): A) uniform resource locator. B) IP address. C) third-level domain. D) root domain. E) child domain. A
The most common web server today is: A) Microsoft IIS. B) WebSTAR. C) IBM HTTP Server. 8 D) Netscape Server. E) Apache HTTP Server E
Which of the following pulls content from websites and feeds it automatically to a user’s computers? A) FTP B) RSS C) HTTP D) Bluetooth E) IPv6 B
Which of the following can be used to help a website achieve a higher ranking with the major search engines? A) VPN. B) IAB. C) SEM. D) SEO. E) RSS. D
Which of the following statements is not true about search engines? A) They are arguably the Internet's "killer app." B) They have solved the problem of how users instantly find information on the Internet. C) They are monetized almost exclusively by search engine marketing. D) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged. E) Users are increasingly using search engines on mobile devices. D
Which process is used to protect transmitted data in a VPN? A) Tunneling B) PPP C) VOIP D) Packet-switching E) Chaining A
________ monetizes the value of the data stored by search engines. A) TCP/IP B) RSS C) WiMax D) IoT E) SEM E
Shopping bots use ________ software for searching the Internet. A) Web 2.0 B) Web 3.0 C) intelligent agent D) comparison E) SEO C
Which of the following is not a defining feature of Web 2.0? A) Interactivity B) Real-time user control C) Semantic search D) Social participation (sharing) E) User-generated content C
A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers. A) RSS B) WAN C) NFP D) ISP E) FTP D
The backbone networks of the Internet are typically owned by long-distance telephone companies called: A) regional network providers. B) enhanced service providers. C) internet bulk providers. D) backbone providers. E) network service providers. E
A(n) ________ is software for locating and managing stored web pages. A) web server B) net server C) router D) modem E) hub A
All of the following are physical components of an RFID system except: A) bar codes. B) antennas. C) radio transmitters. D) tags. E) a stationary or handheld device. A
Which digital cellular standard is used widely throughout the world except the United States? A) GSM B) CDMA C) WLAN D) LTD E) 4G A
The concept of a future web in which it is commonplace for everyday objects to be connected, controlled or monitored over the Internet is called: A) the Internet of Things. B) the Semantic Web. C) Internet2. D) a 3-D Web. E) Web 2.0. A
Which of the following statements about RFID is not true? A) RFIDs transmit only over a short range. B) RFIDs use an antenna to transmit data. C) Microchips embedded in RFIDs are used to store data. D) RFIDs require line-of-sight contact to be read. E) RFID tags and antennas come in a variety of shapes and sizes. D
Which of the following is the first generation of cellular systems suitable for watching videos? A) 2G B) 2.5G C) 3G D) 3.5G E) 4G E
4G networks use which of the following standards? A) GSM and LTD B) CDMA and PAN C) LTE and LTD D) T-Mobile and AT&T E) LTE and WiMax E
The most appropriate wireless networking standard for creating PANs is: A) I-mode. B) IEEE 802.11b. C) Wi-Fi. D) Bluetooth. E) RFID. D
Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication. A) two B) five C) eight D) fifteen E) twenty C
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as: A) touch points. B) netcenters. C) hot points. D) wireless hubs. E) hotspots. E
The 802.11 set of standards is known as: A) WLAN. B) WSN. C) Wi-Fi. D) WiMax. E) WAN C
The WiMax standard can transmit up to a distance of approximately: A) 30 meters. B) 500 meters. C) 30 miles. D) 5 miles. E) 70 miles. C
Based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business? A) Logging transactions B) Managing the supply chain C) Lowering network costs D) Enabling client communication E) Improving employee engagement B
Macy’s Pick to the Last Unit system, described in the chapter-opening case, is an example of which of the following? A) IoT application B) IoP application C) BLE application D) GPS application E) Web 3.0 application A
A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub. A) RFID receiver B) WiMax receiver C) access point D) hub E) hotspot C
Created by: endurance1997
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards