Management Chapter 07 The process of employing techniques to help a Web

subject Type Homework Help
subject Pages 10
subject Words 3020
subject Authors Kenneth C. Laudon

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
67) What technology allows people to have Knowledge pulled from Web sites and fed
automatically to their computers?
A) FTP
B) RSS
C) HTTP
D) Bluetooth
68) The process of employing techniques to help a Web site achieve a higher ranking with the
major search engines is called
A) VPN.
B) IAB.
C) SEM.
D) SEO.
69) Which of the following statements is not true about search engines?
A) They are arguably the Internet's "killer app."
B) They have solved the problem of how users instantly find information on the Internet.
C) They are monetized almost exclusively by search engine marketing.
D) There are hundreds of search engines vying for user attention, with no clear leader
having yet emerged.
70) Which of the following is the first generation of cellular systems suitable for watching
videos?
page-pf2
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
A) 2G
B) 2.5G
C) 3G
D) 4G
71) 4G networks are also known as ________ networks.
A) GSM
B) CDMA
C) LTD
D) T-Mobile
72) The most appropriate wireless networking standard for creating PANs is
A) I-mode.
B) IEEE 802.11b.
C) Wi-Fi.
D) Bluetooth.
73) Bluetooth can be used to link up to ________ devices within a 10-meter area using low-
power, radio-based communication.
A) four
B) six
C) eight
D) ten
page-pf3
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
74) Which process is used to protect transmitted data in a VPN?
A) tunneling
B) PPP
C) VOIP
D) packet-switching
75) One or more access points positioned on a ceiling, wall, or other strategic spot in a public
place to provide maximum wireless coverage for a specific area are referred to as
A) touch points.
B) hotspots.
C) hot points.
D) wireless hubs.
76) The 802.11 set of standards is known as
A) WLAN.
B) WSN.
C) Wi-Fi.
D) WiMax.
page-pf4
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
77) The WiMax standard can transmit up to a distance of approximately
A) 30 meters.
B) 500 meters.
C) 30 miles.
D) 5 miles.
78) Passive RFID tags
A) have their own power source.
B) have a range of several feet.
C) enable data to be rewritten and modified.
D) are used in automated toll-collection systems.
79) Based on your reading of the examples in the chapter, what would be the best use of RFID
for a business?
A) logging transactions
B) managing the supply chain
C) lowering network costs
D) enabling client communication
80) The ______________________________ routes and manages communications on the
network and coordinates network resources.
A) Network operating system (NOS)
B) Hubs
page-pf5
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
C) Switch
D) Router
81) ________________________________ are very simple devices that connect network
components, sending a packet of data to all other connected devices.
A) Network operating system (NOS)
B) Hubs
C) Switch
D) Router
82) A ______________________________ has more intelligence than a hub and can filter and
forward data to a specified destination on the network.
A) Network operating system (NOS)
B) Hubs
C) Switch
D) Router
83) A_________________________ is a communications processor used to route packets of
data through different networks, ensuring that the data sent gets to the correct address.
A) Network operating system (NOS)
B) Hubs
C) Switch
D) Router
page-pf6
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
84) The __________________________ enables client application programs to access the other
layers and defines the protocols that applications use to exchange data.
A) Application layer
B) Transport layer
C) Internet layer
D) Network Interface
85) The _________________________ is responsible for providing the Application layer with
communication and packet services.
A) Application layer
B) Transport layer
C) Internet layer
D) Network Interface
86) The _________________________ is responsible for addressing, routing, and packaging
data packets called IP datagrams.
A) Application layer
B) Transport layer
C) Internet layer
D) Network Interface
page-pf7
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
87) The ____________________________ layer is responsible for placing packets on and
receiving them from the network medium, which could be any networking technology.
A) Application layer
B) Transport layer
C) Internet layer
D) Network Interface
88) _____________________ are strands of copper wire twisted in pairs for voice and data
communications.
A) Twisted pair wire
B) Coaxial cable
C) Fibre optic cable
D) Wireless transmission media
89) _____________________ are thickly insulated copper wire, which is capable of high-speed
data transmission and less subject to interference than twisted wire.
A) Twisted pair wire
B) Coaxial cable
C) Fibre optic cable
D) Wireless transmission media
page-pf8
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
90) _____________________ are strands of clear glass fibre, transmitting data as pulses of light
generated by lasers.
A) Twisted pair wire
B) Coaxial cable
C) Fibre optic cable
D) Wireless transmission media
91) ________ monetizes the value of the data stored by search engines.
92) A(n) ________ is a device that forwards packets of data through different networks,
ensuring that the data gets to the right address.
93) ________ combine the functionality of a cell phone with the computing of a laptop.
page-pf9
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
94) A(n) ________ signal is a discrete, binary waveform that transmits data coded into two
discrete states such as 1-bits and 0-bits.
95) Shopping bots use ________ software for searching the Internet.
96) Web sites that enable users to share information, collaborate, and create new services and
Knowledge are called ________ sites.
97) A(n) ________ is a commercial organization with a permanent connection to the Internet
that sells temporary connections to retail subscribers.
98) The backbone networks of the Internet are typically owned by long-distance telephone
companies called ________.
page-pfa
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
99) A(n) ________ is software for locating and managing stored Web pages.
100) A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to
a wired network, router, or hub.
101) The ___________________________ routes and manages communications on the network
and coordinates network resources.
102) ______________________________ is a new networking approach in which many of these
control functions are managed by one central program, which can run on inexpensive
commodity servers that are separate from the network devices themselves.
103) A _____________________ is a set of rules and procedures governing transmission of
information between two points in a network.
page-pfb
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
104) The __________________ layer enables client application programs to access the other
layers and defines the protocols that applications use to exchange data.
105) The _____________________ layer is responsible for addressing, routing, and packaging
data packets called IP datagrams.
106) ____________________________enables two or more people who are simultaneously
connected to the Internet to hold live, interactive conversations.
107) A ________________________ is a secure, encrypted, private network that has been
configured within a public network to take advantage of the economies of scale and
management facilities of large networks, such as the Internet
108) ____________________________________is the process of improving the quality and
volume of Web traffic to a Web site by employing a series of techniques that help a Web
site achieve a higher ranking with the major search engines when certain keywords and
phrases are put in the search field.
page-pfc
109) ____________________________________ sites enable users to build communities of
friends and professional colleagues.
110) _______________________is the popular name for the 802.15 wireless networking
standard, which is useful for creating small personal area networks (PANs).
111) How does packet switching work?
112) Identify the layers of the Department of Defense reference model for TCP/IP, and describe
how this model works.
page-pfd
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
113) Describe and explain the idea of "network neutrality." Are you in favor of network
neutrality? Why or why not?
114) You have been hired by a small new Web design firm to set up a network for its single
office location. The network is primarily needed for exchanging files, accessing and
managing beta Web sites on their Web server, and connecting to the Internet. The firm hires
many freelancers who come into the office on an ad-hoc basis and it does not have a lot of
money to spend on infrastructure. What type of network will you recommend?
page-pfe
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition
115) What are the business advantages of using voice over IP (VoIP) technology?
116) How are RFID systems used in inventory control and supply chain management?
118) What are wireless sensor networks? How do they work and what are they used for?
page-pff
119) What is Web 3.0, and how do you think Web 3.0 developments could impact businesses?
120) Blogs, wikis, and social networking sites were designed for individuals to communicate
with each other. What uses do businesses have for these tools? Give specific examples.
121) What has made the Google search engine so successful?
page-pf10
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.