Management Chapter 7 2 Student views The Impact Businesses Would Vary Example

subject Type Homework Help
subject Pages 9
subject Words 2825
subject Authors Jane P. Laudon, Kenneth C. Laudon

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
47) Instant messaging is a type of ________ service.
A) chat
B) cellular
C) e-mail
D) wireless
E) network
48) ________ integrate disparate channels for voice communications, data communications,
instant messaging, e-mail, and electronic conferencing into a single experience.
A) Wireless networks
B) Intranets
C) Virtual private networks
D) Modems
E) Unified communications
49) A VPN
A) is an encrypted private network configured within a public network.
B) is more expensive than a dedicated network.
C) provides secure, encrypted communications using Telnet.
D) is an Internet-based service for delivering voice communications.
E) is a proprietary networking service technology developed by individual corporations.
page-pf2
50) Web browser software requests Web pages from the Internet using which protocol?
A) URL
B) HTTP
C) DNS
D) HTML
E) FTP
51) Together, a protocol prefix, a domain name, a directory path, and a document name, are
called a(n)
A) uniform resource locator.
B) IP address.
C) third-level domain.
D) root domain.
E) child domain.
52) The most common Web server today is
A) Microsoft IIS.
B) WebSTAR.
C) IBM HTTP Server.
D) Netscape Server.
E) Apache HTTP Server.
page-pf3
53) What technology allows people to have content pulled from Web sites and fed automatically
to their computers?
A) FTP
B) RSS
C) HTTP
D) Bluetooth
E) IPv6
54) The process of employing techniques to help a Web site achieve a higher ranking with the
major search engines is called
A) VPN.
B) IAB.
C) SEM.
D) SEO.
E) RSS.
55) Which of the following statements is not true about search engines?
A) They are arguably the Internet's "killer app."
B) They have solved the problem of how users instantly find information on the Internet.
C) They are monetized almost exclusively by search engine marketing.
D) There are hundreds of search engines vying for user attention, with no clear leader having yet
emerged.
E) Users are increasingly using search engines on mobile devices.
page-pf4
56) Which process is used to protect transmitted data in a VPN?
A) tunneling
B) PPP
C) VOIP
D) packet-switching
E) chaining
57) ________ monetizes the value of the data stored by search engines.
A) TCP/IP
B) RSS
C) WiMax
D) Wireless sensor networks
E) Search engine marketing
58) Shopping bots use ________ software for searching the Internet.
A) Web 2.0
B) Web 3.0
C) intelligent agent
D) comparison
E) SEO
page-pf5
59) Web sites that enable users to share information, collaborate, and create new services and
content are called ________ sites.
A) third generation
B) second generation
C) first generation
D) new wave
E) mashup
60) A(n) ________ is a commercial organization with a permanent connection to the Internet that
sells temporary connections to retail subscribers.
A) RSS
B) WAN
C) NFP
D) ISP
E) FTP
61) The backbone networks of the Internet are typically owned by long-distance telephone
companies called
A) regional network providers.
B) enhanced service providers.
C) internet bulk providers.
D) backbone providers.
E) network service providers.
page-pf6
62) A(n) ________ is software for locating and managing stored Web pages.
A) Web server
B) net server
C) router
D) modem
E) hub
63) Wikis allow visitors to change or add to the original posted material.
64) The Domain Name System (DNS) converts domain names to IP addresses.
65) VoIP technology delivers voice information in digital form using packet switching.
page-pf7
66) Web 3.0 is an effort to add a layer of meaning to the existing Web in order to reduce the
amount of human involvement in searching for and processing Web information.
67) Mobile search makes up at least 50% of all Internet searches.
68) Describe and explain the idea of "network neutrality." Are you in favor of network
neutrality? Why or why not?
page-pf8
69) What are the business advantages of using voice over IP (VoIP) technology?
70) What is Web 3.0, and how do you think Web 3.0 developments could impact businesses?
71) Blogs, wikis, and social networking sites were designed for individuals to communicate with
each other. What uses do businesses have for these tools? Give specific examples.
page-pf9
72) What has made the Google search engine so successful?
73) All of the following are physical components of an RFID system except
A) bar code.
B) antenna.
C) radio transmitters.
D) tags.
E) a stationary or handheld device.
74) Which digital cellular standard is used widely throughout the world except the United States?
A) GSM
B) CDMA
C) WLAN
D) LTD
E) 4G
page-pfa
75) The concept of a future Web in which it is commonplace for everyday objects to be
connected, controlled or monitored over the Internet is called
A) the Internet of things.
B) the Semantic Web.
C) Internet2.
D) a 3-D Web.
E) Web 2.0.
76) Which of the following statements about RFID is not true?
A) RFIDs transmit only over a short range.
B) RFIDs use an antenna to transmit data.
C) Microchips embedded in RFIDs are used to store data.
D) RFIDs require line-of-sight contact to be read.
E) RFID tags and antennas come in a variety of shapes and sizes.
77) Which of the following is the first generation of cellular systems suitable for watching
videos?
A) 2G
B) 2.5G
C) 3G
D) 3.5G
E) 4G
page-pfb
78) 4G networks use which standards?
A) GSM and LTD
B) CDMA and PAN
C) LTE and LTD
D) T-Mobile and AT&T
E) LTE and WiMax
79) The most appropriate wireless networking standard for creating PANs is
A) I-mode.
B) IEEE 802.11b.
C) Wi-Fi.
D) Bluetooth.
E) RFID.
80) Bluetooth can be used to link up to ________ devices within a 10-meter area using low-
power, radio-based communication.
A) two
B) five
C) eight
D) fifteen
E) twenty
page-pfc
81) One or more access points positioned on a ceiling, wall, or other strategic spot in a public
place to provide maximum wireless coverage for a specific area are referred to as
A) touch points.
B) netcenters.
C) hot points.
D) wireless hubs.
E) hotspots.
82) The 802.11 set of standards is known as
A) WLAN.
B) WSN.
C) Wi-Fi.
D) WiMax.
E) WAN.
83) The WiMax standard can transmit up to a distance of approximately
A) 30 meters.
B) 500 meters.
C) 30 miles.
D) 5 miles.
E) 70 miles.
page-pfd
84) Based on your reading of the examples in the chapter, what would be the best use of RFID
for a business?
A) logging transactions
B) managing the supply chain
C) lowering network costs
D) enabling client communication
E) improving employee engagement
85) ________ combine the functionality of a cell phone with the computing of a laptop.
A) Smartphones
B) Netbooks
C) Tablets
D) E-readers
E) iPods
86) A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a
wired network, router, or hub.
A) RFID receiver
B) WiMax receiver
C) access point
D) hub
E) hotspot
page-pfe
87) RFID technology is being gradually replaced by less costly technologies such as WSNs.
88) How are RFID systems used in inventory control and supply chain management?
89) What are wireless sensor networks? How do they work and what are they used for?

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.