Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / FPT University ITA 301 Chap 7 1)A device that acts as a connection point between computers and can filter and forward data to a specified destination is called a hub

FPT University ITA 301 Chap 7 1)A device that acts as a connection point between computers and can filter and forward data to a specified destination is called a hub

Business

FPT University

ITA 301

Chap 7

1)A device that acts as a connection point between computers and can filter and forward data to a specified destination is called a

    1. hub.
    2. switch.
    3. router.
    4. NIC.

 

 

 

  1. The Internet is based on which three key technologies?
    1. TCP/IP, HTML, and HTTP
    2. TCP/IP, HTTP, and packet switching
    3. Client/server computing, packet switching, and the development of communications standards for linking networks and computers
    4. Client/server computing, packet switching, and HTTP

 

 

  1. The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called
    1. multiplexing.
    2. packet switching.
    3. packet routing.
    4. ATM.

 

 

 

  1. The telephone system is an example of a                                network.
    1. peer-to-peer
    2. wireless
    3. packet-switched
    4. circuit-switched

 

 

  1. Which of the following is NOT a characteristic of packet switching?
    1. Packets travel independently of each other.
    2. Packets are routed through many different paths.
    3. Packet switching requires point-to-point circuits.
    4. Packets include data for checking transmission errors.

 

 

  1. In TCP/IP, IP is responsible for
    1. disassembling and reassembling of packets during transmission.
    2. establishing an Internet connection between two computers.
    3. moving packets over the network.
    4. sequencing the transfer of packets.

 

 

  1. In a telecommunications network architecture, a protocol is
    1. a device that handles the switching of voice and data in a local area network.
    2. a standard set of rules and procedures for control of communications in a network.
    3. a communications service for microcomputer users.
    4. the main computer in a telecommunications network.

 

 

  1. The four layers of the TCP/IP reference model are
    1. physical layer, application layer, transport layer, and the network interface layer.
    2. physical layer, application layer, Internet layer, and the network interface layer.
    3. application layer, transport layer, Internet layer, and the network interface layer.
    4. application layer, hardware layer, Internet layer, and the network interface layer.

 

 

  1. Which signal types are represented by a continuous waveform?
    1. laser
    2. optical
    3. digital
    4. analog

 

 

  1. To use an analog telephone system for sending digital data, you must use
    1. a modem.
    2. a router.
    3. DSL.
    4. twisted wire.

 

 

  1. Which type of network is used to connect digital devices within a half-mile or 500-meter radius?
    1. microwave
    2. LAN
    3. WAN
    4. MAN

 

 

  1. Which type of network treats all processors equally, and allows peripheral devices to be shared without going to a separate server?
    1. peer-to-peer
    2. wireless
    3. LAN
    4. ring

 

 

  1. Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents?
    1. wireless network in infrastructure mode
    2. domain-based LAN
    3. peer-to-peer network
    4. campus area network

 

  1. In a bus network
    1. signals are broadcast to the next station.
    2. signals are broadcast in both directions to the entire network.
    3. multiple hubs are organized in a hierarchy.
    4. messages pass from computer to computer in a loop.

 

 

  1. All network components connect to a single hub in a                               network.
    1. star
    2. bus
    3. domain
    4. peer-to-peer

 

 

  1. The most common Ethernet topology is
    1. bus.
    2. star.
    3. ring.
    4. mesh.

 

 

 

  1. A network that spans a city, and sometimes its major suburbs as well, is called a
    1. CAN.
    2. MAN.
    3. WAN.
    4. LAN.

 

 

  1. A network that covers entire geographical regions is most commonly referred to as a(n):
    1. local area network.
    2. intranet.
    3. peer-to-peer network.
    4. wide area network.

 

 

 

  1.                        work(s) by using radio waves to communicate with radio antennas placed within adjacent geographic areas.
    1. Cell phones
    2. Microwaves
    3. Satellites
    4. WANs

 

 

  1. Bandwidth is the
    1. number of frequencies that can be broadcast through a medium.
    2. number of cycles per second that can be sent through a medium.
    3. difference between the highest and lowest frequencies that can be accommodated on a single channel.
    4. total number of bytes that can be sent through a medium per second.

 

 

  1. The total amount of digital information that can be transmitted through any telecommunications medium is measured in
    1. bps.
    2. Hertz.
    3. baud.
    4. gigaflops.

 

 

  1. Digital subscriber lines
    1. operate over existing telephone lines to carry voice, data, and video.
    2. operate over coaxial lines to deliver Internet access.
    3. are very-high-speed data lines typically leased from long-distance telephone companies.
    4. have up to twenty-four 64-Kbps channels.

 

 

  1. T lines
    1. operate over existing telephone lines to carry voice, data, and video.
    2. operate over coaxial lines to deliver Internet access.
    3. are very-high-speed data lines typically leased from long-distance telephone companies.
    4. have up to twenty-four 64-Kbps channels.

 

 

  1. Which protocol is the Internet based on?
    1. TCP/IP
    2. FTP
    3. packet-switching
    4. HTTP

 

 

  1. What service converts IP addresses into more recognizable alphanumeric names?
    1. HTML
    2. DNS
    3. IP
    4. HTTP

 

 

  1. The child domain of the root is the
    1. top-level domain.
    2. second-level domain.
    3. host name.
    4. domain extension.

 

 

  1. In the domain name "http://myspace.blogging.com", what are the root, top-level, second- level, and third-level domains, respectively?
    1. "http://", myspace, blogging, com
    2. "http://", com, blogging, myspace
    3. ".", com, blogging, myspace
    4. ".", myspace, blogging, com

 

 

  1. Which organization helps define the overall structure of the Internet?
    1. None (no one "owns" the Internet)
    2. W3C
    3. ICANN
    4. IAB

 

 

  1. IPv6 is being developed in order to
    1. update the packet transmission protocols for higher bandwidth.
    2. create more IP addresses.
    3. allow for different levels of service.
    4. support Internet2.

 

 

  1. Which of the following services enables logging on to one computer system and working on another?
    1. FTP
    2. LISTSERV
    3. Telnet
    4. World Wide Web

 

  1. Instant messaging is a type of                           service.
    1. chat
    2. cellular
    3. Web
    4. wireless

 

 

  1. The need in some cases for employees to have access to sexually explicit material on the Internet, such as medical researchers, suggests that companies
    1. cannot restrict Internet use.
    2. need specialized software to determine which types of material are acceptable.
    3. may need to maintain a database of acceptable Web sites.
    4. need to base their Internet use policies on the needs of the organization and culture.

 

  1.                        integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience.
    1. Wireless networks
    2. Intranets
    3. Virtual private networks
    4. Unified communications

 

 

  1. A VPN
    1. is an encrypted private network configured within a public network.
    2. is more expensive than a dedicated network.
    3. provides secure, encrypted communications using Telnet.
    4. is an Internet-based service for delivering voice communications.

 

  1. Web browser software requests Web pages from the Internet using which protocol?
    1. URL
    2. HTTP
    3. DNS
    4. HTML

 

 

  1. Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n)
    1. uniform resource locator.
    2. unified resource locator.
    3. third level domain.
    4. root domain.

 

 

 

  1. The open-source Web server that controls 70 percent of the market is
    1. Microsoft IIS.
    2. ASP.net.
    3. Apache HTTP server.
    4. Netscape.

 

 

  1. What technology allows people to have content pulled from Web sites and fed automatically to their computers?
    1. FTP
    2. RSS
    3. HTTP
    4. Bluetooth

 

  1. To keep internal data secure, a company employing an extranet must be sure to put a

                      in place

    1. router
    2. server
    3. firewall
    4. switch

 

 

  1. A network that connects authorized customers, suppliers, and other business partners to portions of a firm's internal network is called a(n)
    1. intranet.
    2. extranet.
    3. enterprise network.
    4. virtual private network.

 

 

  1. Which generation of network are wireless cellular phone systems entering?
    1. 2.5G
    2. 3G
    3. 3.5G
    4. 4G

 

 

  1. CDMA
    1. is the major European digital cellular standard.
    2. is more expensive than GSM.
    3. transmits over several frequencies.
    4. uses the 1.9 GHz band.

 

  1. The most appropriate wireless networking standard for creating PANs is
    1. I-mode.
    2. IEEE 802.11b.
    3. WiFi.
    4. Bluetooth.

 

 

 

  1. Bluetooth can be used to link up to                            devices within a 10-meter area using low- power, radio-based communication.
    1. four
    2. six
    3. eight
    4. ten

 

 

  1. The Wi-Fi 802.11a standard can transmit up to
    1. 54 Mbps in the 5-GHz frequency range.
    2. 11 Mbps in the 2.4-GHz frequency range.
    3. 54 Mbps in the 2.4-GHz frequency range.
    4. 722 Kbps in the 2.4-GHz frequency range.

 

 

  1. One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as
    1. touch points.
    2. hotspots.
    3. hot points.
    4. wireless hubs.

 

 

  1. The IEEE standard for the WiMax is A) IEEE 802.15.

B) IEEE 802.11.

C) IEEE 802.16.

D) IEEE 802.20.

 

 

 

  1. The WiMax standard can transmit up to a distance of approximately
    1. 30 meters.
    2. 500 meters.
    3. 30 miles.
    4. 5 miles.

 

 

  1. Passive RFID tags
    1. have their own power source.
    2. have a range of several feet.
    3. enable data to be rewritten and modified.
    4. are used in automated toll-collection systems.

 

 

  1. Based on your reading of the examples in the chapter, what would be the best use of RFID for a business?
    1. transactions
    2. supply chain management
    3. lowering network costs
    4. enabling client communication

 

 

 

 

 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Related Questions