This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
47) Instant messaging is a type of ________ service.
A) chat
B) cellular
C) e-mail
D) wireless
E) network
48) ________ integrate disparate channels for voice communications, data communications,
instant messaging, e-mail, and electronic conferencing into a single experience.
A) Wireless networks
B) Intranets
C) Virtual private networks
D) Modems
E) Unified communications
49) A VPN
A) is an encrypted private network configured within a public network.
B) is more expensive than a dedicated network.
C) provides secure, encrypted communications using Telnet.
D) is an Internet-based service for delivering voice communications.
E) is a proprietary networking service technology developed by individual corporations.
50) Web browser software requests Web pages from the Internet using which protocol?
A) URL
B) HTTP
C) DNS
D) HTML
E) FTP
51) Together, a protocol prefix, a domain name, a directory path, and a document name, are
called a(n)
A) uniform resource locator.
B) IP address.
C) third-level domain.
D) root domain.
E) child domain.
52) The most common Web server today is
A) Microsoft IIS.
B) WebSTAR.
C) IBM HTTP Server.
D) Netscape Server.
E) Apache HTTP Server.
53) What technology allows people to have content pulled from Web sites and fed automatically
to their computers?
A) FTP
B) RSS
C) HTTP
D) Bluetooth
E) IPv6
54) The process of employing techniques to help a Web site achieve a higher ranking with the
major search engines is called
A) VPN.
B) IAB.
C) SEM.
D) SEO.
E) RSS.
55) Which of the following statements is not true about search engines?
A) They are arguably the Internet's "killer app."
B) They have solved the problem of how users instantly find information on the Internet.
C) They are monetized almost exclusively by search engine marketing.
D) There are hundreds of search engines vying for user attention, with no clear leader having yet
emerged.
E) Users are increasingly using search engines on mobile devices.
56) Which process is used to protect transmitted data in a VPN?
A) tunneling
B) PPP
C) VOIP
D) packet-switching
E) chaining
57) ________ monetizes the value of the data stored by search engines.
A) TCP/IP
B) RSS
C) WiMax
D) Wireless sensor networks
E) Search engine marketing
58) Shopping bots use ________ software for searching the Internet.
A) Web 2.0
B) Web 3.0
C) intelligent agent
D) comparison
E) SEO
59) Web sites that enable users to share information, collaborate, and create new services and
content are called ________ sites.
A) third generation
B) second generation
C) first generation
D) new wave
E) mashup
60) A(n) ________ is a commercial organization with a permanent connection to the Internet that
sells temporary connections to retail subscribers.
A) RSS
B) WAN
C) NFP
D) ISP
E) FTP
61) The backbone networks of the Internet are typically owned by long-distance telephone
companies called
A) regional network providers.
B) enhanced service providers.
C) internet bulk providers.
D) backbone providers.
E) network service providers.
62) A(n) ________ is software for locating and managing stored Web pages.
A) Web server
B) net server
C) router
D) modem
E) hub
63) Wikis allow visitors to change or add to the original posted material.
64) The Domain Name System (DNS) converts domain names to IP addresses.
65) VoIP technology delivers voice information in digital form using packet switching.
66) Web 3.0 is an effort to add a layer of meaning to the existing Web in order to reduce the
amount of human involvement in searching for and processing Web information.
67) Mobile search makes up at least 50% of all Internet searches.
68) Describe and explain the idea of "network neutrality." Are you in favor of network
neutrality? Why or why not?
69) What are the business advantages of using voice over IP (VoIP) technology?
70) What is Web 3.0, and how do you think Web 3.0 developments could impact businesses?
71) Blogs, wikis, and social networking sites were designed for individuals to communicate with
each other. What uses do businesses have for these tools? Give specific examples.
72) What has made the Google search engine so successful?
73) All of the following are physical components of an RFID system except
A) bar code.
B) antenna.
C) radio transmitters.
D) tags.
E) a stationary or handheld device.
74) Which digital cellular standard is used widely throughout the world except the United States?
A) GSM
B) CDMA
C) WLAN
D) LTD
E) 4G
75) The concept of a future Web in which it is commonplace for everyday objects to be
connected, controlled or monitored over the Internet is called
A) the Internet of things.
B) the Semantic Web.
C) Internet2.
D) a 3-D Web.
E) Web 2.0.
76) Which of the following statements about RFID is not true?
A) RFIDs transmit only over a short range.
B) RFIDs use an antenna to transmit data.
C) Microchips embedded in RFIDs are used to store data.
D) RFIDs require line-of-sight contact to be read.
E) RFID tags and antennas come in a variety of shapes and sizes.
77) Which of the following is the first generation of cellular systems suitable for watching
videos?
A) 2G
B) 2.5G
C) 3G
D) 3.5G
E) 4G
78) 4G networks use which standards?
A) GSM and LTD
B) CDMA and PAN
C) LTE and LTD
D) T-Mobile and AT&T
E) LTE and WiMax
79) The most appropriate wireless networking standard for creating PANs is
A) I-mode.
B) IEEE 802.11b.
C) Wi-Fi.
D) Bluetooth.
E) RFID.
80) Bluetooth can be used to link up to ________ devices within a 10-meter area using low-
power, radio-based communication.
A) two
B) five
C) eight
D) fifteen
E) twenty
81) One or more access points positioned on a ceiling, wall, or other strategic spot in a public
place to provide maximum wireless coverage for a specific area are referred to as
A) touch points.
B) netcenters.
C) hot points.
D) wireless hubs.
E) hotspots.
82) The 802.11 set of standards is known as
A) WLAN.
B) WSN.
C) Wi-Fi.
D) WiMax.
E) WAN.
83) The WiMax standard can transmit up to a distance of approximately
A) 30 meters.
B) 500 meters.
C) 30 miles.
D) 5 miles.
E) 70 miles.
84) Based on your reading of the examples in the chapter, what would be the best use of RFID
for a business?
A) logging transactions
B) managing the supply chain
C) lowering network costs
D) enabling client communication
E) improving employee engagement
85) ________ combine the functionality of a cell phone with the computing of a laptop.
A) Smartphones
B) Netbooks
C) Tablets
D) E-readers
E) iPods
86) A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a
wired network, router, or hub.
A) RFID receiver
B) WiMax receiver
C) access point
D) hub
E) hotspot
87) RFID technology is being gradually replaced by less costly technologies such as WSNs.
88) How are RFID systems used in inventory control and supply chain management?
89) What are wireless sensor networks? How do they work and what are they used for?
Trusted by Thousands of
Students
Here are what students say about us.
Resources
Company
Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.