Deck 3: Information and Communications Technologies: The Enterprise Architecture
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/115
Play
Full screen (f)
Deck 3: Information and Communications Technologies: The Enterprise Architecture
1
The ASCII code determines how characters are encoded into digital strings.
True
2
Java is often used to provide instructions for set-top cable boxes, mobile phones, car navigation systems, lottery terminals, medical devices, and web cams.
True
3
Magnetic tapes are the most suitable backup storage option for a fast moving e-commerce Web site.
False
4
Virtualization is an eco-friendly technology.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
5
A legacy system is a system that is an assemblage of inter-related, tightly bound elements that cannot be differentiated or upgraded.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
6
In the context of telecommunications, a network is a group of interconnected devices.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
7
In a computer, the central processing unit handles information processing, calculations, and control tasks.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
8
Digital subscriber lines significantly improve transmission speed over twisted pair wires.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
9
A wireless router has a wired connection to the network and sends radio signals from the antennae.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
10
Voice phone calls, which require circuit-switching, cannot be configured to a packet-switching network.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
11
Electromagnetic waves include gamma rays.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
12
Commercial off-the-shelf software require permission from the software developers before it can be installed and used.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
13
Typing speed can be increased by using a mouse rather than by using keyboard shortcuts.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
14
Peer-to-peer networks support file sharing on the Internet.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
15
Application software includes operating system software and utilities.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
16
The thin, flexible shape of coaxial cables allow them to wind easily through ceilings, walls, and cubicles.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
17
As a result of the rising demand for wireless bandwidth, there is not a single part of the wireless spectrum which is left unlicensed.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
18
Speech input devices have overtaken all other input devices.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
19
Cloud computing frees information stranded on individual devices.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
20
A database is an example of a system software.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
21
Most applications rely on texting, e-mail, and instant messaging rather than speech recognition because speech recognition ________.
A) is less accurate
B) is more expensive
C) does not have a supporting software
D) requires longer processing time
A) is less accurate
B) is more expensive
C) does not have a supporting software
D) requires longer processing time
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following input devices is capable of transmitting motion and location information?
A) a hard drive
B) a keyboard
C) a mouse
D) an optical drive
A) a hard drive
B) a keyboard
C) a mouse
D) an optical drive
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following terms describes an organization's current situation and where it should head to achieve its mission, focusing especially on business strategy and the technology infrastructure required to achieve it?
A) programming paradigm
B) enterprise architecture
C) mission statement
D) software archaeology
A) programming paradigm
B) enterprise architecture
C) mission statement
D) software archaeology
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
24
Optical scanners equipped with optical character recognition (OCR) software were first used by ________.
A) banks for processing checks
B) the military for guarding army outposts
C) supermarkets to monitor shipments
D) universities to evaluate answer sheets
A) banks for processing checks
B) the military for guarding army outposts
C) supermarkets to monitor shipments
D) universities to evaluate answer sheets
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is an example of an application software?
A) MS Word
B) iOS
C) Windows 7
D) Android
A) MS Word
B) iOS
C) Windows 7
D) Android
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
26
In comparison with primary storage, hard drives are ________.
A) more expensive
B) slower in processing digital information
C) more volatile and lose data when power is turned off
D) smaller in storage capacity
A) more expensive
B) slower in processing digital information
C) more volatile and lose data when power is turned off
D) smaller in storage capacity
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
27
"Cloud computing" is more about a brand new architecture than mere marketing hype.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
28
RFID tags are typically used for ________.
A) capturing data on weather conditions
B) processing checks in banks
C) surveillance of ATM machines
D) tracking shipments of physical goods
A) capturing data on weather conditions
B) processing checks in banks
C) surveillance of ATM machines
D) tracking shipments of physical goods
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
29
The ________ code defines how keyboard characters are encoded into digital strings of ones and zeros.
A) T.61
B) ASCII
C) ANSEL
D) MARC-8
A) T.61
B) ASCII
C) ANSEL
D) MARC-8
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
30
Optical scanners are used to ________.
A) track and interpret body movement
B) monitor traffic patterns
C) decipher barcodes and other symbols
D) read information embedded in RFID tags
A) track and interpret body movement
B) monitor traffic patterns
C) decipher barcodes and other symbols
D) read information embedded in RFID tags
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is a type of volatile memory typically consisting of integrated chips located close to the central processing unit (CPU)?
A) random access memory
B) flash memory
C) read-only memory
D) bubble memory
A) random access memory
B) flash memory
C) read-only memory
D) bubble memory
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following is an accurate description of "Moore's Law"?
A) The cost of microprocessor chips is halved about every eighteen months.
B) The amount of data that can be transmitted over an optical fiber cable doubles about every nine months.
C) The number of transistors fitting on a chip doubles about every two years.
D) The cost of a semiconductor fabrication plant doubles about every four years.
A) The cost of microprocessor chips is halved about every eighteen months.
B) The amount of data that can be transmitted over an optical fiber cable doubles about every nine months.
C) The number of transistors fitting on a chip doubles about every two years.
D) The cost of a semiconductor fabrication plant doubles about every four years.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following computer components accepts signals and converts them to a digital format that matches the signal's meaning?
A) a screen
B) a hard disk
C) a keyboard
D) a speaker
A) a screen
B) a hard disk
C) a keyboard
D) a speaker
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
34
________ capture text or images and convert them to digital format in thousands of settings.
A) Optical scanners
B) RFID tags
C) Graphics tablets
D) Barcode readers
A) Optical scanners
B) RFID tags
C) Graphics tablets
D) Barcode readers
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following is a feature of the devices that form the physical basis of information and communication technologies (ICT)?
A) They are considered computers or computer components.
B) They are a mixture of analog and digital devices.
C) They process information using the hexadecimal numerical system.
D) They are all devices whose computing capacities match those of mainframe computers.
A) They are considered computers or computer components.
B) They are a mixture of analog and digital devices.
C) They process information using the hexadecimal numerical system.
D) They are all devices whose computing capacities match those of mainframe computers.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is a characteristic of random access memory (RAM)?
A) RAM is more easily accessed and searched than hard disk memory.
B) RAM stores memory permanently for use by the central processing unit.
C) RAM capacity is generally in the range of tens to hundreds of gigabytes.
D) RAM is volatile storage that is erased when power is turned off or lost.
A) RAM is more easily accessed and searched than hard disk memory.
B) RAM stores memory permanently for use by the central processing unit.
C) RAM capacity is generally in the range of tens to hundreds of gigabytes.
D) RAM is volatile storage that is erased when power is turned off or lost.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following classes of computers is widely distributed in developing countries and typically used as a cost-effective means of wirelessly connecting to the Internet?
A) microcomputers
B) mainframe computers
C) netbooks
D) minicomputers
A) microcomputers
B) mainframe computers
C) netbooks
D) minicomputers
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following classes of computers is still typically used for massive bulk processing tasks and financial transactions?
A) mainframe computers
B) minicomputers
C) microcomputers
D) netbooks
A) mainframe computers
B) minicomputers
C) microcomputers
D) netbooks
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is an important reason why the U.S. adopted computing much earlier than countries such as China and Japan?
A) Unlike education in China or Japan, education in the U.S. has been historically based on logic and reasoning.
B) Mathematics, as a subject, was initially developed in the U.S. and China and Japan adopted mathematics much later.
C) The Chinese and other cultures were reluctant to abandon traditional computing methods, such as abacuses, in favor of modern computing.
D) The English alphabet is easier to accommodate on the ASCII keyboard than the Chinese or Japanese alphabets.
A) Unlike education in China or Japan, education in the U.S. has been historically based on logic and reasoning.
B) Mathematics, as a subject, was initially developed in the U.S. and China and Japan adopted mathematics much later.
C) The Chinese and other cultures were reluctant to abandon traditional computing methods, such as abacuses, in favor of modern computing.
D) The English alphabet is easier to accommodate on the ASCII keyboard than the Chinese or Japanese alphabets.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
40
________ is a technology placed on tags with small chips equipped with a microprocessor, a tiny antenna to receive and transmit data, and sometimes a battery that stores information on the tagged object's history.
A) GPS
B) RFID
C) GPRS
D) CDMA
A) GPS
B) RFID
C) GPRS
D) CDMA
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following tasks is performed by utility software?
A) handling input and output to devices such as keyboards and monitors
B) maintaining file structures
C) allocating memory for the needs of application software
D) compressing and backing up files
A) handling input and output to devices such as keyboards and monitors
B) maintaining file structures
C) allocating memory for the needs of application software
D) compressing and backing up files
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following is an advantage of using twisted pair wires for transmission?
A) Their thin, flexible shape lets them wind easily through ceilings, walls, and cubicles.
B) They are resistant to interference.
C) They are sturdy and durable.
D) They offer the highest rates of data transmission.
A) Their thin, flexible shape lets them wind easily through ceilings, walls, and cubicles.
B) They are resistant to interference.
C) They are sturdy and durable.
D) They offer the highest rates of data transmission.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following types of utility software makes deleted files completely unrecoverable?
A) shredder software
B) recovery software
C) disk defragmenter software
D) compression software
A) shredder software
B) recovery software
C) disk defragmenter software
D) compression software
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
44
Fiber optic cables are ideal for long distance transmission because ________.
A) they are cheap and easily available
B) they are extremely flexible and are extremely durable
C) they do not require special hardware to interface with other transmission media
D) light signals do not attentuate as much as electrical signals do
A) they are cheap and easily available
B) they are extremely flexible and are extremely durable
C) they do not require special hardware to interface with other transmission media
D) light signals do not attentuate as much as electrical signals do
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
45
Which type of software supports all kinds of individual activities, ranging from e-mail, word processing, and game playing to databases?
A) system software
B) firmware
C) utility software
D) application software
A) system software
B) firmware
C) utility software
D) application software
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
46
________ transmission sends signals in the gigahertz range to relays in the line of sight.
A) Longitudinal wave
B) Microwave
C) Radio wave
D) Infrared
A) Longitudinal wave
B) Microwave
C) Radio wave
D) Infrared
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
47
What is wavelength?
A) It is the maximum transmission, in bit rate, across a channel.
B) It is the number of cycles that a wave repeats per second.
C) It is the distance between one peak of an electromagnetic wave and the next.
D) It is the speed at which a wave travels through a physical medium or through vacuum.
A) It is the maximum transmission, in bit rate, across a channel.
B) It is the number of cycles that a wave repeats per second.
C) It is the distance between one peak of an electromagnetic wave and the next.
D) It is the speed at which a wave travels through a physical medium or through vacuum.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
48
The difference between the market for smartphone operating systems and desktop computer operating systems is that there are ________.
A) more customers buying smartphone applications than desktop applications
B) more applications developed for desktop computer OS than for smartphone OS
C) more platforms available for desktop OS manufacturers than smartphone OS manufacturers
D) more smartphone OS manufacturers than desktop OS manufacturers
A) more customers buying smartphone applications than desktop applications
B) more applications developed for desktop computer OS than for smartphone OS
C) more platforms available for desktop OS manufacturers than smartphone OS manufacturers
D) more smartphone OS manufacturers than desktop OS manufacturers
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
49
Which wired media is typically used to carry television signals?
A) coaxial cables
B) optical fibers
C) twisted pair wires
D) shielded cables
A) coaxial cables
B) optical fibers
C) twisted pair wires
D) shielded cables
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
50
Which of the following is an example of an operating system?
A) Mozilla Firefox
B) MS Access
C) Linux
D) Adobe Acrobat Reader
A) Mozilla Firefox
B) MS Access
C) Linux
D) Adobe Acrobat Reader
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
51
Single inner conductor wires (typically copper), surrounded by insulation, which is then surrounded by a mesh-like conductor are called ________.
A) twisted pair wires
B) coaxial cables
C) optical fiber cables
D) shielded cables
A) twisted pair wires
B) coaxial cables
C) optical fiber cables
D) shielded cables
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following transmission media is used in ordinary telephones?
A) coaxial cables
B) twisted pair wires
C) optical fiber cables
D) ribbon cables
A) coaxial cables
B) twisted pair wires
C) optical fiber cables
D) ribbon cables
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following is an open source product?
A) McAfee Antivirus
B) Mozilla Firefox
C) Adobe Photoshop
D) Microsoft Office
A) McAfee Antivirus
B) Mozilla Firefox
C) Adobe Photoshop
D) Microsoft Office
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
54
The maximum amount of information measured in bits per second which a particular channel can transmit is called its ________.
A) frequency
B) spectral efficiency
C) wavelength
D) bandwidth
A) frequency
B) spectral efficiency
C) wavelength
D) bandwidth
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
55
Software which is freely distributed along with the code underlying the program, without the aim of generating revenue, is known as ________.
A) legacy software
B) proprietary software
C) open source software
D) firmware
A) legacy software
B) proprietary software
C) open source software
D) firmware
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following is the most accurate definition of software as a service (SaaS)?
A) software which is ready to be installed and used immediately after purchase
B) an information system that is owned, hosted, and managed remotely by a vendor
C) software which is developed by an organization along with developers for specific needs
D) software that is available in source code form
A) software which is ready to be installed and used immediately after purchase
B) an information system that is owned, hosted, and managed remotely by a vendor
C) software which is developed by an organization along with developers for specific needs
D) software that is available in source code form
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
57
Software products such as Microsoft Office, WordPerfect, Adobe Premiere, and Eudora Pro are also called ________.
A) legacy software
B) utility software
C) open-source software
D) COTS software
A) legacy software
B) utility software
C) open-source software
D) COTS software
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
58
The frequency of electromagnetic waves is measured in ________.
A) hertz (Hz)
B) decibels (dB)
C) meters per second (m/s)
D) bytes per second (bps)
A) hertz (Hz)
B) decibels (dB)
C) meters per second (m/s)
D) bytes per second (bps)
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
59
Which type of software controls basic operations such as file management, disk storage, hardware interfaces, and security?
A) application software
B) system software
C) firmware
D) programming software
A) application software
B) system software
C) firmware
D) programming software
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following is a function of operating systems?
A) scanning for viruses
B) maintaining file structures
C) compressing and backing up files
D) performing cleanup routines
A) scanning for viruses
B) maintaining file structures
C) compressing and backing up files
D) performing cleanup routines
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
61
Mary connects to the Internet and types the address of a Web page on her browser. The browser sends a request to the system hosting the Web page, which then sends back the instructions to display the page requested. Which network is being used in this process?
A) circuit-switched network
B) client-server network
C) peer-to-peer network
D) VoIP network
A) circuit-switched network
B) client-server network
C) peer-to-peer network
D) VoIP network
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
62
Which network protocol is the one most widely used for local area networks?
A) IPv6
B) HTTP
C) Ethernet
D) IPv4
A) IPv6
B) HTTP
C) Ethernet
D) IPv4
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
63
A network which connects computers, printers, scanners, and other devices in a single building or home is called a ________.
A) wide area network
B) personal area network
C) local area network
D) global area network
A) wide area network
B) personal area network
C) local area network
D) global area network
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
64
Which of the following is a disadvantage of VoIP communication?
A) high costs of communication
B) increased rates of dropped calls or bad audio
C) greater inefficiencies due to wasted capacity
D) higher susceptibility to traffic congestion
A) high costs of communication
B) increased rates of dropped calls or bad audio
C) greater inefficiencies due to wasted capacity
D) higher susceptibility to traffic congestion
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
65
Which of the following situations is representative of the last mile issue in telecommunications?
A) An e-commerce site is available in only two language versions and customers speaking neither cannot browse through the site while shopping.
B) Suburban subscribers of an Internet Service Provider complain of poor Internet speeds compared to those enjoyed by downtown users.
C) Asian buyers of a certain smartphone brand are unable to use features such as 3G and Wifi because those countries do not yet have the relevant infrastructure.
D) Students find that the farther they are from their university building, the harder it is to connect to the Internet with their laptops.
A) An e-commerce site is available in only two language versions and customers speaking neither cannot browse through the site while shopping.
B) Suburban subscribers of an Internet Service Provider complain of poor Internet speeds compared to those enjoyed by downtown users.
C) Asian buyers of a certain smartphone brand are unable to use features such as 3G and Wifi because those countries do not yet have the relevant infrastructure.
D) Students find that the farther they are from their university building, the harder it is to connect to the Internet with their laptops.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following is a part of the suit of protocols used for Internet communications that connect Ethernet and other networks together?
A) File Transfer Protocol
B) Transmission Control Protocol
C) Hypertext Transfer Protocol
D) Routing Information Protocol
A) File Transfer Protocol
B) Transmission Control Protocol
C) Hypertext Transfer Protocol
D) Routing Information Protocol
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
67
Which of the following is a computer network in which connections rely on radio waves at frequencies of 2.4 GHz or 5 GHz for transmission?
A) CDMA
B) GPRS
C) Ethernet
D) Wifi
A) CDMA
B) GPRS
C) Ethernet
D) Wifi
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
68
What is the drawback of using circuit-switching networks?
A) It often leads to waste of capacity.
B) It leads to a huge number of dropped calls.
C) It does not offer high rates of data transmission.
D) It does not support secure transmission of data.
A) It often leads to waste of capacity.
B) It leads to a huge number of dropped calls.
C) It does not offer high rates of data transmission.
D) It does not support secure transmission of data.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
69
Which of the following characteristics makes packet-switched networks preferable to circuit-switched networks?
A) security
B) quality
C) reliability
D) flexibility
A) security
B) quality
C) reliability
D) flexibility
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
70
Phone carriers had an edge over cable TV companies, in terms of last mile connectivity, because ________.
A) they supported higher transmission speeds
B) their networks used thicker coaxial cables
C) twisted pair wires could be repurposed to two-way communications
D) the optical fiber technology used could support greater bandwidth
A) they supported higher transmission speeds
B) their networks used thicker coaxial cables
C) twisted pair wires could be repurposed to two-way communications
D) the optical fiber technology used could support greater bandwidth
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
71
Why is it difficult to enforce copyright infringement laws against peer-to-peer networks?
A) Copyright laws in force today have no jurisdiction over the Internet.
B) Authorities are unable to determine if the sharer is guilty of copyright infringement or the downloader.
C) The copyrighted material is never stored in a centralized server.
D) Copyright action against violators is hindered by the Fourth Amendment to the U.S. Constitution.
A) Copyright laws in force today have no jurisdiction over the Internet.
B) Authorities are unable to determine if the sharer is guilty of copyright infringement or the downloader.
C) The copyrighted material is never stored in a centralized server.
D) Copyright action against violators is hindered by the Fourth Amendment to the U.S. Constitution.
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
72
What is the function of the lower layers in the Open Systems Interconnection (OSI) model?
A) determining how a device connects physically using a transmission medium
B) determining how software applications will interface with the user
C) determining how any errors in data transmission will be identified and corrected
D) determining how the connection will be established and then broken off when finished
A) determining how a device connects physically using a transmission medium
B) determining how software applications will interface with the user
C) determining how any errors in data transmission will be identified and corrected
D) determining how the connection will be established and then broken off when finished
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
73
Which of the following is an example of peer-to-peer network?
A) Mozilla Firefox
B) BitTorrent
C) Microsoft Office
D) Google Docs
A) Mozilla Firefox
B) BitTorrent
C) Microsoft Office
D) Google Docs
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
74
Which of the following is a decentralized network in which there is no central server?
A) cloud network
B) star network
C) peer-to-peer network
D) client-server network
A) cloud network
B) star network
C) peer-to-peer network
D) client-server network
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following types of networks has one or more high performance hosts running programs and storing data that different users can access?
A) client-server network
B) overlay network
C) peer-to-peer network
D) voice over IP network
A) client-server network
B) overlay network
C) peer-to-peer network
D) voice over IP network
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
76
Kazaa is a software that is commonly used to share audio and video files and documents over the Internet. These files are located in user's computers and not on a centralized server. Kazaa is an example of ________.
A) peer-to-peer application
B) utility software
C) software as a service
D) open source software
A) peer-to-peer application
B) utility software
C) software as a service
D) open source software
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
77
In a client-server network, any particular request by a client can involve one or more servers. This structure is referred to as ________.
A) database-centric architecture
B) IPv6 architecture
C) n-tier architecture
D) peer-to-peer architecture
A) database-centric architecture
B) IPv6 architecture
C) n-tier architecture
D) peer-to-peer architecture
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
78
________ refers to the technologies that make voice communications across networks using packets feasible, including over the Internet.
A) PSTN
B) VoIP
C) POTS
D) RFID
A) PSTN
B) VoIP
C) POTS
D) RFID
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
79
Which of the following factors makes VoIP technology preferable to customers over circuit-switched networks?
A) security of data transmission
B) reliability of communication
C) lower rates of dropped calls
D) greater range of supplementary services
A) security of data transmission
B) reliability of communication
C) lower rates of dropped calls
D) greater range of supplementary services
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck
80
Which of the following features of peer-to-peer networks would be most likely to give users an incentive to share?
A) providing malware and spyware protection to those who share
B) introducing daily quotas for downloading files
C) charging a membership fee for downloading files
D) providing better download speeds to those who share files
A) providing malware and spyware protection to those who share
B) introducing daily quotas for downloading files
C) charging a membership fee for downloading files
D) providing better download speeds to those who share files
Unlock Deck
Unlock for access to all 115 flashcards in this deck.
Unlock Deck
k this deck