Filters
Question type

Study Flashcards

A VPN:


A) is an encrypted private network configured within a public network.
B) is more expensive than a dedicated network.
C) provides secure,encrypted communications using Telnet.
D) is an Internet-based service for delivering voice communications.
E) is a proprietary networking service technology developed by individual corporations.

F) A) and E)
G) A) and C)

Correct Answer

verifed

verified

Which of the following is not one of the top five search engines?


A) Facebook
B) Yahoo
C) Microsoft Bing
D) Ask
E) Google

F) D) and E)
G) C) and D)

Correct Answer

verifed

verified

Which of the following can be used to help a website achieve a higher ranking with the major search engines?


A) VPN
B) IAB
C) SEM
D) SEO
E) RSS

F) B) and E)
G) B) and C)

Correct Answer

verifed

verified

Computer networks are fundamentally different from telephone networks.

A) True
B) False

Correct Answer

verifed

verified

True

A network that spans a city,and sometimes its major suburbs,as well,is called a:


A) CAN.
B) MAN.
C) LAN.
D) WAN.
E) WSN.

F) D) and E)
G) B) and D)

Correct Answer

verifed

verified

________ integrate disparate channels for voice communications,data communications,instant messaging,e-mail,and electronic conferencing into a single experience.


A) Wireless networks
B) Intranets
C) Virtual private networks
D) Modems
E) Unified communications

F) A) and E)
G) B) and C)

Correct Answer

verifed

verified

To use the analog telephone system for sending digital data,you must also use:


A) a modem.
B) a router.
C) DSL.
D) twisted wire.
E) TCP/IP.

F) A) and B)
G) A) and C)

Correct Answer

verifed

verified

What are the four layers of the TCP/IP reference model?


A) Physical,application,transport,and network interface
B) Physical,Application,Internet,and Network Interface
C) Application,Transport,Internet,and Network Interface
D) Application,Hardware,Internet,and Network Interface
E) Software,Hardware,Network Interface,Internet

F) A) and D)
G) A) and E)

Correct Answer

verifed

verified

The child domain of the root is called the:


A) top-level domain.
B) second-level domain.
C) host name.
D) domain extension.
E) mid-tier domain.

F) A) and B)
G) C) and E)

Correct Answer

verifed

verified

Together,a protocol prefix,a domain name,a directory path,and a document name,are called a(n) :


A) uniform resource locator.
B) IP address.
C) third-level domain.
D) root domain.
E) child domain.

F) C) and D)
G) B) and C)

Correct Answer

verifed

verified

A

You have been hired by a small new web design firm to set up a network for its single office location.The network is primarily needed for exchanging files,accessing and managing beta websites on their web server,and connecting to the Internet.The firm hires many freelancers who come into the office on an ad-hoc basis and it does not have a lot of money to spend on infrastructure.What type of network will you recommend?

Correct Answer

verifed

verified

Student answers will vary.An example ans...

View Answer

Mobile search makes up at more than 50% of all Internet searches.

A) True
B) False

Correct Answer

verifed

verified

Which of the following statements about RFID is not true?


A) RFIDs transmit only over a short range.
B) RFIDs use an antenna to transmit data.
C) Microchips embedded in RFIDs are used to store data.
D) RFIDs require line-of-sight contact to be read.
E) RFID tags and antennas come in a variety of shapes and sizes.

F) B) and E)
G) A) and D)

Correct Answer

verifed

verified

Which process is used to protect transmitted data in a VPN?


A) Tunneling
B) PPP
C) VOIP
D) Packet-switching
E) Chaining

F) A) and B)
G) C) and D)

Correct Answer

verifed

verified

RFID technology is being gradually replaced by less costly technologies such as WSNs.

A) True
B) False

Correct Answer

verifed

verified

The Internet is based on which three key technologies?


A) TCP/IP,HTML,and HTTP
B) TCP/IP,HTTP,and packet switching
C) Client/server computing,packet switching,and the development of communications standards for linking networks and computers
D) Client/server computing,packet switching,and HTTP
E) E-mail,instant messaging,and newsgroups

F) None of the above
G) B) and E)

Correct Answer

verifed

verified

Digital rights activists believe "zero-rating" practices violate net neutrality principles.

A) True
B) False

Correct Answer

verifed

verified

What are the two types of signals used to communicate a message in a network and how are they different? What device converts one type to the other type?

Correct Answer

verifed

verified

The two ways to communicate a message in a network are analog signals and digital signals.An analog signal is represented by a continuous waveform that passes through a communications medium and is used for voice communication.Examples include the telephone handset and other types of speakers that generate analog sound.On the other hand,digital signals are binary waveforms (not continuous)that communicate information as strings of two discrete states: one bit or zero bits (often depicted as strings of zeroes and ones).Computers use these types of signals and use modems to convert digital signals to analog signals.

How are RFID systems used in inventory control and supply chain management?

Correct Answer

verifed

verified

In inventory control and supply chain ma...

View Answer

What are some of the common types of physical transmission media and what differentiates them from one another?

Correct Answer

verifed

verified

Common types of physical transmission me...

View Answer

Showing 1 - 20 of 100

Related Exams

Show Answer