Management Information System (MIS) 5th Edition by Hossein Bidgoli -Test Bank A+

$35.00
Management Information System (MIS) 5th Edition by Hossein Bidgoli -Test Bank A+

Management Information System (MIS) 5th Edition by Hossein Bidgoli -Test Bank A+

$35.00
Management Information System (MIS) 5th Edition by Hossein Bidgoli -Test Bank A+

Chapter 6: Data Communication: Delivering Information Anywhere and Anytime

TRUE/FALSE

  1. Data communication systems are significantly apart from an organization’s core functions.

Answer: False

Chapter Learning Outcome: 6.1: Describe major applications of a data communication system.

Topic: Defining Data Communication

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 112

Feedback: Data communication has become so woven into the fabric of corporate activity that separating an organization’s core functions from the data communication systems that enable and support them is difficult.

  1. Data communication technologies make Web and video conferencing easier, which can reduce the costs of business travel.

Answer: True

Chapter Learning Outcome: 6.1: Describe major applications of a data communication system.

Topic: Defining Data Communication

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 112

Feedback: Data communication technologies make Web and video conferencing easier, which can reduce the costs of business travel.

  1. Data transmission channels are generally divided into two types: broadband and narrowband.

Answer: True

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 113

Feedback: Data transmission channels are generally divided into two types: broadband and narrowband.

  1. Protocols help ensure compatibility between different manufacturers’ devices.

Answer: True

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 113

Feedback: Protocols help ensure compatibility between different manufacturers’ devices.

  1. All Internet connections require a modem.

Answer: False

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 113

Feedback: Not all Internet connections require a modem; for example, wireless users connect via access points, and satellite users use a satellite dish.

  1. When phone lines are used for Internet connections, data transmission is possible without the use of analog modems.

Answer: False

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 114

Feedback: When phone lines are used for Internet connections, an analog modem is necessary to convert a computer’s digital signals to analog signals that can be transferred over analog phone lines.

  1. Communication media are used to connect sender and receiver devices.

Answer: True

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 114

Feedback: Communication media, or channels, connect sender and receiver devices. They can be conducted (wired or guided) or radiated (wireless).

  1. Fiber-optic cables have the lowest bandwidth of any communication medium.

Answer: False

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 115

Feedback: Fiber-optic cables have the highest bandwidth of any communication medium.

  1. Radiated media use a fiber-optic cable for transmitting data through air or water.

Answer: False

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 115

Feedback: Radiated media use an antenna for transmitting data through air or water.

  1. Terrestrial microwave systems use ground-based microwave transmitters and receivers for transmitting data.

Answer: False

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 115

Feedback: Terrestrial microwave systems use Earth-based transmitters and receivers and are often used for point-to-point links between buildings.

  1. In a point-to-point system, several devices share the same communication medium simultaneously.

Answer: False

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 115

Feedback: A communication medium can be a point-to-point or a multipoint system. In a point-to-point system, only one device at a time uses the medium. In a multipoint system, several devices share the same medium, and a transmission from one device can be sent to all other devices sharing the link.

  1. In a centralized processing system, processing power is distributed among several locations.

Answer: False

Chapter Learning Outcome: 6.3: Describe the major types of processing configurations.

Topic: Processing Configurations

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 115

Feedback: In a centralized processing system, all processing is done at one central computer; whereas in distributed processing, processing power is distributed among several locations.

  1. Distributed processing configuration maintains decentralized control and centralized operations.

Answer: False

Chapter Learning Outcome: 6.3: Describe the major types of processing configurations.

Topic: Processing Configurations

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 115

Feedback: Distributed processing maintains centralized control and decentralized operations.

  1. In the Open Systems Interconnection (OSI) model, the session layer is responsible for formatting message packets.

Answer: False

Chapter Learning Outcome: 6.3: Describe the major types of processing configurations.

Topic: Processing Configurations

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 116–117

Feedback: In the Open Systems Interconnection (OSI) model, the session layer establishes a communication session between computers; whereas the presentation layer is responsible for formatting message packets.

  1. Data transfer rates of local area networks (LANs) are typically below 100 Mbps.

Answer: False

Chapter Learning Outcome: 6.4: Explain the three types of networks.

Topic: Types of Networks

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 117

Feedback: Data transfer speeds of local area networks (LANs) typically vary from 100 Mbps to 10 Gbps.

  1. Ethernet is a standard communication protocol embedded in software and hardware devices used for building a local area network (LAN).

Answer: True

Chapter Learning Outcome: 6.4: Explain the three types of networks.

Topic: Types of Networks

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 117–118

Feedback: Ethernet is a standard communication protocol embedded in software and hardware devices used for building a local area network (LAN).

  1. An Ethernet cable is used to connect computers, hubs, switches, and routers to a network.

Answer: True

Chapter Learning Outcome: 6.4: Explain the three types of networks.

Topic: Types of Networks

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 118

Feedback: An Ethernet cable is used to connect computers, hubs, switches, and routers to a network.

  1. Coaxial cables are incompatible with wide area networks (WANs).

Answer: False

Chapter Learning Outcome: 6.4: Explain the three types of networks.

Topic: Types of Networks

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 118

Feedback: A wide area network (WAN) can use many different communication media (coaxial cables, satellite, and fiber optics) and terminals of different sizes and sophistication (PCs, workstations, and mainframes).

  1. A star topology uses a large number of cables to connect the nodes within a network.

Answer: True

Chapter Learning Outcome: 6.5: Describe the main network topologies.

Topic: Network Topologies

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 119

Feedback: Many cables are required for a star topology, which increases cost.

  1. The ring topology needs more cable than a star topology.

Answer: False

Chapter Learning Outcome: 6.5: Describe the main network topologies.

Topic: Network Topologies

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 120

Feedback: A ring topology needs less cable than a star topology, but it is similar to a star topology in that it is better for handling heavy but short bursts of traffic.

  1. A bus topology connects nodes along a network segment, with the ends connected in a manner similar to a ring topology.

Answer: False

Chapter Learning Outcome: 6.5: Describe the main network topologies.

Topic: Network Topologies

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 120

Feedback: The bus topology connects nodes along a network segment, but the ends of the cable are not connected, as they are in a ring topology.

  1. A multiplexer is a hardware and software device that controls data transfer from a computer to a peripheral device and vice versa.

Answer: False

Chapter Learning Outcome: 6.5: Describe the main network topologies.

Topic: Network Topologies

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 121

Feedback: A controller is a hardware and software device that controls data transfer from a computer to a peripheral device (examples are a monitor, a printer, or a keyboard) and vice versa. A multiplexer is a

hardware device that allows several nodes to share one communication channel.

  1. Internet protocol (IP) is responsible for packet forwarding.

Answer: True

Chapter Learning Outcome: 6.6: Explain important networking concepts, such as bandwidth, routing, routers, and the client/server model.

Topic: Major Networking Concepts

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 121

Feedback: Internet protocol (IP) is responsible for packet forwarding. To perform this task, it must be aware of the available data link protocols and the optimum size of each packet.

  1. Any packet-switching network can handle multimedia data.

Answer: True

Chapter Learning Outcome: 6.6: Explain important networking concepts, such as bandwidth, routing, routers, and the client/server model.

Topic: Major Networking Concepts

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 122

Feedback: Any packet-switching network can handle multimedia data, such as text, graphics, audio, and video.

  1. When a bridge connects two local area networks (LANs) using the same protocol, the communication medium must be the same on both LANs.

Answer: False

Chapter Learning Outcome: 6.6: Explain important networking concepts, such as bandwidth, routing, routers, and the client/server model.

Topic: Major Networking Concepts

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 123

Feedback: A bridge connects two local area networks (LANs) using the same protocol, and the communication medium does not have to be the same on both LANs.

  1. A router operates at the Application layer of the Open Systems Interconnection (OSI) model.

Answer: False

Chapter Learning Outcome: 6.6: Explain important networking concepts, such as bandwidth, routing, routers, and the client/server model.

Topic: Major Networking Concepts

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 123

Feedback: A router operates at the Network layer of the Open Systems Interconnection (OSI) model and handles routing packets on a network.

  1. The most common n-tier architecture is the three-tier architecture.

Answer: True

Chapter Learning Outcome: 6.6: Explain important networking concepts, such as bandwidth, routing, routers, and the client/server model.

Topic: Major Networking Concepts

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 124

Feedback: The most common n-tier architecture is the three-tier architecture.

  1. Wireless network traffic can be captured with sniffers.

Answer: True

Chapter Learning Outcome: 6.7: Describe wireless and mobile technologies and networks.

Topic: Wireless and Mobile Networks

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 126

Feedback: One of the drawbacks of mobile and wireless networks is that wireless network traffic can be captured with sniffers.

  1. An access point (AP) is the part of a wireless local area network (WLAN) that connects it to other networks.

Answer: True

Chapter Learning Outcome: 6.8: Discuss the importance of wireless security and the techniques used.

Topic: Wireless Security

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 129

Feedback: An access point (AP) is the part of a wireless local area network (WLAN) that connects it to other networks.

  1. In the context of mobile networking, 3G networks have increased the quality of Internet Telephony or Voice over Internet Protocol (VoIP).

Answer: True

Chapter Learning Outcome: 6.9: Summarize the convergence phenomenon and its applications for business and personal use.

Topic: Convergence of Voice, Video, and Data

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 131

Feedback: The 3G network has increased the rate of information transfer, its quality, video and broadband wireless data transfers, and the quality of Internet telephony or Voice over Internet Protocol (VoIP).

MULTIPLE CHOICE

  1. Which of the following is an important application of data communication systems for managers to consult decision makers located throughout the world?
  2. E-collaboration
  3. E-banking
  4. E-governance
  5. E-learning

Answer: A

Chapter Learning Outcome: 6.1: Describe major applications of a data communication system.

Topic: Defining Data Communication

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 112

Feedback: E-collaborations and virtual meetings are other important applications of data communication systems for managers. These applications are cost effective and improve customer service.

  1. The amount of data that can be transferred from one point to another in one second is called _____.
a.bandwidthc.topology
b.packetd.protocol

Answer: A

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 113

Feedback: Bandwidth is the amount of data that can be transferred from one point to another in a certain time period, usually one second.

  1. In _____ data transmission, multiple pieces of data are sent simultaneously to increase the transmission rate.
a.narrowbandc.broadband
b.wide aread.modular

Answer: C

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 113

Feedback: In broadband data transmission, multiple pieces of data are sent simultaneously to increase the transmission rate.

  1. In a typical data communication system, which of the following statements is true of a sender and receiver device?
  2. An input/output device has processing power.
  3. A smart terminal is a full-featured computer.
  4. A workstation can serve as a stand-alone system.
  5. A netbook computer is a high-cost computer with disks.

Answer: C

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 113

Feedback: An intelligent terminal, workstation, or personal computer can serve as an input/output device or as a stand-alone system.

  1. A(n) _____ is a device that connects a user to the Internet.
a.routerc.cookie
b.modemd.applet

Answer: B

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 113

Feedback: A modem (short for “modulator-demodulator”) is a device that connects a user to the Internet.

  1. _____ is a high-speed carrier service that uses ordinary phone lines to send and receive data.
a.An analog modemc.Code division multiple access (CDMA)
b.Digital subscriber line (DSL)d.A cable modem

Answer: B

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 114

Feedback: Digital subscriber line (DSL), a common carrier service, is a high-speed service that uses ordinary phone lines. With DSL connections, users can receive data at up to 7.1 Mbps and send data at around 1 Mbps, although the actual speed is determined by proximity to the provider’s location.

  1. _____ are conducted communication media, which can be used for both data and voice transmissions.
a.Terrestrial microwavesc.Coaxial cables
b.Broadcast radiosd.Satellites

Answer: C

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 114

Feedback: Coaxial cables are thick cables that can be used for both data and voice transmissions. They are used mainly for long-distance telephone transmissions and local area networks.

  1. Coaxial cables are used mainly for:
  2. local area networks.
  3. television signals.
  4. short-distance telephone transmissions.
  5. broadcast radio.

Answer: A

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 114

Feedback: Coaxial cables are thick cables that can be used for both data and voice transmissions.

They are used mainly for long-distance telephone transmissions and local area networks.

  1. _____ cables are glass tubes surrounded by concentric layers of glass, called cladding, to form a light path through wire cables.
a.Twisted-pairc.Coaxial
b.Copper lined.Fiber-optic

Answer: D

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 114

Feedback: Fiber-optic cables are glass tubes (half the diameter of a human hair) surrounded by concentric layers of glass, called “cladding,” to form a light path through wire cables.

  1. Which of the following media is based on line of sight?
a.Terrestrial microwavec.Coaxial cable
b.STP wired.Fiber-optic cable

Answer: A

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 115

Feedback: Radiated media use an antenna for transmitting data through air or water. Some of these media are based on “line of sight” (an open path between sending and receiving devices or antennas), including broadcast radio, terrestrial microwave, and satellite.

  1. _____ cables have the highest bandwidth of any communication medium.
  2. Coaxial
  3. Fiber-optic
  4. Twisted pair copper
  5. Triaxial

Answer: B

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 115

Feedback: Fiber-optic cables have a higher capacity, smaller size, lighter weight, lower attenuation, and higher security than other cable types; they also have the highest bandwidth of any communication medium.

  1. In _____ processing, each department has its own computer for performing processing tasks.
a.centralizedc.distributed
b.decentralizedd.modular

Answer: B

Chapter Learning Outcome: 6.3: Describe the major types of processing configurations.

Topic: Processing Configurations

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 115

Feedback: In decentralized processing, each user, department, or division has its own computer (sometimes called an “organizational unit”) for performing processing tasks.

  1. The _____ layer of the Open Systems Interconnection (OSI) model serves as the window through which computer programs access network services.
a.applicationc.network
b.presentationd.data link

Answer: A

Chapter Learning Outcome: 6.3: Describe the major types of processing configurations.

Topic: Processing Configurations

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 116

Feedback: The application layer of the Open Systems Interconnection (OSI) model serves as the window through which applications or computer programs access network services. It performs different tasks, depending on the application, and provides services that support users’ tasks, such as file transfers, database access, and e-mail.

  1. The _____ layer of the Open Systems Interconnection (OSI) model formats message packets.
a.sessionc.presentation
b.applicationd.network

Answer: C

Chapter Learning Outcome: 6.3: Describe the major types of processing configurations.

Topic: Processing Configurations

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 116

Feedback: The presentation layer of the Open Systems Interconnection (OSI) model formats message packets.

  1. The _____ layer of the Open Systems Interconnection (OSI) model generates a receiver’s address; and ensures the integrity of messages by making sure packets are delivered without error, in sequence, and with no loss or duplication.
a.applicationc.session
b.presentationd.transport

Answer: D

Chapter Learning Outcome: 6.3: Describe the major types of processing configurations.

Topic: Processing Configurations

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 117

Feedback: The transport layer of the Open Systems Interconnection (OSI) model generates the receiver’s address; and ensures the integrity of messages by making sure packets are delivered without error, in sequence, and with no loss or duplication.

16.The _____ layer of the Open Systems Interconnection (OSI) model specifies the electrical connections between computers and the transmission medium; and is primarily concerned with transmitting binary data, or bits, over a communication network.

a.applicationc.physical
b.transportd.data link

Answer: C

Chapter Learning Outcome: 6.3: Describe the major types of processing configurations.

Topic: Processing Configurations

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 117

Feedback: The physical layer of the Open Systems Interconnection (OSI) model specifies the electrical connections between computers and the transmission medium; defines the physical medium used for communication. This layer is primarily concerned with transmitting binary data, or bits, over a communication network.

  1. A network interface card (NIC) operates at the Open Systems Interconnection (OSI) model’s _____ layers.
  2. Presentation and Application
  3. Session and Presentation
  4. Network and Transport
  5. Physical and Data Link

Answer: D

Chapter Learning Outcome: 6.4: Explain the three types of networks.

Topic: Types of Networks

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 117

Feedback: A network interface card (NIC), also called an “adapter card,” is the physical link between a network and a workstation, so it operates at the Open Systems Interconnection (OSI) model’s Physical and Data Link layers.

  1. Computers in a local area network (LAN) are usually connected to the network via a(n) _____, which is a hardware component.
a.Ethernetc.IP address
b.adapter cardd.network protocol

Answer: B

Chapter Learning Outcome: 6.4: Explain the three types of networks.

Topic: Types of Networks

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 117

Feedback: In a local area network (LAN), computers are usually connected to the network via a network interface card (NIC), a hardware component that enables computers to communicate over a network.

  1. Local area networks (LANs) are used to _____.
a.integrate services, such as e-mail and file sharing
b.link computers that are geographically far apart
c.connect various WANs in metropolitan areas
d.provide communication services spanning several cities or states

Answer: A

Chapter Learning Outcome: 6.4: Explain the three types of networks.

Topic: Types of Networks

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 117

Feedback: Local area networks (LANs) are used most often to share resources, such as peripherals, files, and software. They are also used to integrate services, such as e-mail and file sharing.

  1. A network _____ represents a network’s physical layout.
a.pathc.protocol
b.packetd.topology

Answer: D

Chapter Learning Outcome: 6.5: Describe the main network topologies.

Topic: Network Topologies

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 119

Feedback: A network topology represents a network’s physical layout, including the arrangement of computers and cables.

  1. In a bus topology, hardware devices called _____ are used at each end of the cable to absorb a transmitted signal.
a.emulatorsc.stoppers
b.terminatorsd.nodes

Answer: B

Chapter Learning Outcome: 6.5: Describe the main network topologies.

Topic: Network Topologies

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 120

Feedback: In a bus topology, a hardware device called a terminator is used at each end of the cable to absorb the signal.

  1. A hierarchical topology is also called a _____ topology.
a.layeredc.tree
b.mixedd.vertical

Answer: C

Chapter Learning Outcome: 6.5: Describe the main network topologies.

Topic: Network Topologies

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 120

Feedback: A hierarchical topology (also called a “tree”) combines computers with different processing strengths in different organizational levels.

  1. Traditional mainframe networks use a _____ topology.
a.ringc.mesh
b.stard.hierarchical

Answer: D

Chapter Learning Outcome: 6.5: Describe the main network topologies.

Topic: Network Topologies

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 120–121

Feedback: Traditional mainframe networks also use a hierarchical topology. The mainframe computer is at the top, front-end processors (FEPs) are at the next level, controllers and multiplexers are at the next level, and terminals and workstations are at the bottom level.

  1. A _____ is a hardware device that allows several nodes to share one communication channel.
a.multiplexerc.database
b.controllerd.client system

Answer: A

Chapter Learning Outcome: 6.5: Describe the main network topologies.

Topic: Network Topologies

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 121

Feedback: A multiplexer is a hardware device that allows several nodes to share one communication channel.

  1. The Transmission Control Protocol (TCP) operates at the Open Systems Interconnection (OSI) model’s _____ layer.
a.data linkc.transport
b.physicald.network

Answer: C

Chapter Learning Outcome: 6.6: Explain important networking concepts, such as bandwidth, routing, routers, and the client/server model.

Topic: Major Networking Concepts

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 121

Feedback: The Transmission Control Protocol (TCP) operates at the Open Systems Interconnection (OSI) model’s Transport Layer.

  1. The process of deciding which path the data takes on a network is called _____.
a.convergencec.roaming
b.divergenced.routing

Answer: D

Chapter Learning Outcome: 6.6: Explain important networking concepts, such as bandwidth, routing, routers, and the client/server model.

Topic: Major Networking Concepts

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 122

Feedback: The process of deciding which path the data takes on a network is called routing.

  1. A routing table lists _____.
a.nodes on a network
b.the IP address of the router
c.the protocols that each node understands
d.the packets to be sent

Answer: A

Chapter Learning Outcome: 6.6: Explain important networking concepts, such as bandwidth, routing, routers, and the client/server model.

Topic: Major Networking Concepts

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 122

Feedback: The routing table lists nodes on a network and the path to each node, along with alternate routes and the speed of existing routes.

  1. A(n) _____ is a network connecting device, which can build tables that identify addresses on each network.
a.switchc.dynamic router
b.adapter cardd.hub

Answer: C

Chapter Learning Outcome: 6.6: Explain important networking concepts, such as bandwidth, routing, routers, and the client/server model.

Topic: Major Networking Concepts

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 123

Feedback: A router is a network connection device containing software that connects network systems and controls traffic flow between them. A dynamic router can build tables that identify addresses on each network.

  1. Which of the following is the first action to take place in the most basic client/server configuration?
a.The results are formatted and displayed.
b.The server receives a query.
c.The client accepts a request.
d.The user creates a query.

Answer: D

Chapter Learning Outcome: 6.6: Explain important networking concepts, such as bandwidth, routing, routers, and the client/server model.

Topic: Major Networking Concepts

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 123

Feedback: In the most basic client/server configuration, first of all, the user runs client software to create a query.

  1. Horizontal scaling of client/server architecture means _____.
a.migrating the network to decentralized serversc.adding more proxy servers
b.migrating the network to faster serversd.adding more workstations

Answer: D

Chapter Learning Outcome: 6.6: Explain important networking concepts, such as bandwidth, routing, routers, and the client/server model.

Topic: Major Networking Concepts

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 123

Feedback: Horizontal scaling means adding more workstations (clients), and vertical scaling means migrating the network to larger, faster servers.

  1. A _____ is a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter.
a.dynamic networkc.mesh network
b.mobile networkd.wired network

Answer: B

Chapter Learning Outcome: 6.7: Describe wireless and mobile technologies and networks.

Topic: Wireless and Mobile Networks

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 126

Feedback: A mobile network (also called a “cellular network”) is a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter, known as a “cell site” or “base station.”

  1. _____ refers to using a cellular phone outside of a carrier’s limited service area.
a.Routingc.Roaming
b.Teleprocessingd.Surfing

Answer: C

Chapter Learning Outcome: 6.7: Describe wireless and mobile technologies and networks.

Topic: Wireless and Mobile Networks

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 128

Feedback: Roaming is using a cellular phone outside of a carrier’s limited service area. By doing this, users are extending the connectivity service in a location that is different from the home location where the service was first registered.

  1. In the context of the technologies developed to improve the efficiency and quality of digital communications, _____ divides each channel into six time slots.
a.Time Division Multiple Access (TDMA)
b.Transmission Control Protocol (TCP)
c.Mobile Telephone Switching Office (MTSO)
d.Code Division Multiple Access (CDMA)

Answer: A

Chapter Learning Outcome: 6.7: Describe wireless and mobile technologies and networks.

Topic: Wireless and Mobile Networks

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 128

Feedback: Time Division Multiple Access (TDMA) divides each channel into six time slots. Each user is allocated two slots: one for transmission and one for reception. This method increases efficiency by 300 percent, as it allows carrying three calls on one channel.

34.The Wi-Fi Protected Access (WPA2) uses _____ to obtain a master key, which is in turn used to negotiate for a key that will be used for a session.

a.Internet Protocol (IP) addressc.Wired Equivalent Privacy (WEP)
b.Service Set Identifier (SSID)d.Extensible Authentication Protocol (EAP)

Answer: D

Chapter Learning Outcome: 6.8: Discuss the importance of wireless security and the techniques used.

Topic: Wireless Security

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 130

Feedback: The Wi-Fi Protected Access 2 (WPA2) uses Extensible Authentication Protocol (EAP) to obtain a master key. With this master key, a user’s computer and the AP negotiate for a key that will be used for a session. After the session is terminated, the key is discarded.

  1. In data communication, _____ refers to integrating voice, video, and data so that multimedia information can be used for decision making.
a.attenuationc.telepresence
b.convergenced.routing

Answer: B

Chapter Learning Outcome: 6.9: Summarize the convergence phenomenon and its applications for business and personal use.

Topic: Convergence of Voice, Video, and Data

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 130

Feedback: In data communication, convergence refers to integrating voice, video, and data so that multimedia information can be used for decision making.

COMPLETION

  1. _____ is the loss of power in a signal as it travels from the sending device to the receiving device.

Answer: Attenuation

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 113

Feedback: Attenuation is the loss of power in a signal as it travels from the sending device to the receiving device.

  1. _____ is a voice-grade transmission channel capable of transmitting a maximum of 56,000 bps, so only a limited amount of information can be transferred in a specific period of time.

Answer: Narrowband

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 113

Feedback: Narrowband is a voice-grade transmission channel capable of transmitting a maximum of 56,000 bps, so only a limited amount of information can be transferred in a specific period of time.

  1. _____ are rules that govern data communication, including error detection, message length, and transmission speed.

Answer: Protocols

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 113

Feedback: Synchronization is handled with protocols, rules that govern data communication, including error detection, message length, and transmission speed.

  1. In the context of communication media, _____ provide a physical path along which signals are transmitted, including twisted pair cable, coaxial cable, and fiber optics.

Answer: conducted media

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 114

Feedback: Conducted media provide a physical path along which signals are transmitted, including twisted pair copper cable, coaxial cable, and fiber optics.

  1. Communication media that use an antenna for transmitting data through air or water are called _____.

Answer: radiated media

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 115

Feedback: Radiated media use an antenna for transmitting data through air or water, including broadcast radio, terrestrial microwave, and satellite.

  1. In the context of different processing configurations, a(n) _____ processing system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers.

Answer: centralized

Chapter Learning Outcome: 6.3: Describe the major types of processing configurations.

Topic: Processing Configurations

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 115

Feedback: In the early days of computer technology, centralized processing system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers.

  1. The _____ model is a seven-layer architecture for defining how data is transmitted from computer to computer in a network.

Answer: Open Systems Interconnection (OSI)

OSI

Open Systems Interconnection

Chapter Learning Outcome: 6.3: Describe the major types of processing configurations.

Topic: Processing Configurations

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 116

Feedback: The Open Systems Interconnection (OSI) model is a seven-layer architecture for defining how data is transmitted from computer to computer in a network.

  1. In the context of different network types, a(n) _____ is typically used to connect workstations and peripheral devices that are in close proximity.

Answer: local area network (LAN)

LAN

local area network

Chapter Learning Outcome: 6.4: Explain the three types of networks.

Topic: Types of Networks

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 117

Feedback: A local area network (LAN) connects workstations and peripheral devices that are in close proximity.

  1. In the context of different network types, a(n) _____ is designed to handle data communication for multiple organizations in a city and sometimes nearby cities as well.

Answer: metropolitan area network (MAN)

MAN

metropolitan area network

Chapter Learning Outcome: 6.4: Explain the three types of networks.

Topic: Types of Networks

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 118

Feedback: A metropolitan area network (MAN) is designed to handle data communication for multiple organizations in a city and sometimes nearby cities as well.

  1. A(n) _____ topology works well for companies that are geographically dispersed.

Answer: hierarchical

Chapter Learning Outcome: 6.5: Describe the main network topologies.

Topic: Network Topologies

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 120

Feedback: Companies that are geographically dispersed and organized hierarchically are good candidates for a hierarchical topology.

  1. A(n) _____ is a collection of binary digits, including message data and control characters for formatting and transmitting, sent from computer to computer over a network.

Answer: packet

Chapter Learning Outcome: 6.6: Explain important networking concepts, such as bandwidth, routing, routers, and the client/server model.

Topic: Major Networking Concepts

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 122

Feedback: A packet is a collection of binary digits—including message data and control characters for formatting and transmitting—sent from computer to computer over a network.

  1. In _____ routing, one node is in charge of selecting the path for all packets.

Answer: centralized

Chapter Learning Outcome: 6.6: Explain important networking concepts, such as bandwidth, routing, routers, and the client/server model.

Topic: Major Networking Concepts

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 122

Feedback: In centralized routing, one node is in charge of selecting the path for all packets. This node, considered the network routing manager, stores the routing table; and any changes to a route must be made at this node.

  1. In a(n) _____ architecture, the application logic is usually on the client side.

Answer: two-tier

Chapter Learning Outcome: 6.6: Explain important networking concepts, such as bandwidth, routing, routers, and the client/server model.

Topic: Major Networking Concepts

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 124

Feedback: In the two-tier architecture, the application logic can be on the client, on the server, or split between them, although it is usually on the client side.

  1. Both Wireless LANs (WLANs) and Wireless WANs (WWANs) rely on the _____ as the communication medium.

Answer: RF spectrum

Chapter Learning Outcome: 6.7: Describe wireless and mobile technologies and networks.

Topic: Wireless and Mobile Networks

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 127

Feedback: Both Wireless LANs (WLANs) and Wireless WANs (WWANs) rely on the RF spectrum as the communication medium.

15._____ is a technique to improve the security of wireless networks, which combines the strongest features of Wired Equivalent Privacy (WEP) and Extensible Authentication Protocol (EAP) techniques.

Answer: WPA

Wi-Fi Protected Access

Wi-Fi Protected Access (WPA)

Chapter Learning Outcome: 6.8: Discuss the importance of wireless security and the techniques used.

Topic: Wireless Security

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 130

Feedback: Wi-Fi Protected Access (WPA) is a technique to improve the security of wireless networks, which combines the strongest features of Wired Equivalent Privacy (WEP) and Extensible Authentication Protocol (EAP) techniques.

SHORT ANSWER

  1. Why is an efficient data communication system critical to an information system?

Answer: An information system’s effectiveness is measured in part by how efficiently it delivers information, and a data communication system is what enables an information system to carry out this function. In addition, because most organizations collect and transfer data across large geographic distances, an efficient data communication system is critical.

Chapter Learning Outcome: 6.1: Describe major applications of a data communication system.

Topic: Defining Data Communication

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 111

  1. List the three main components of a typical data communication system.

Answer: A typical data communication system includes the following components:

  1. Sender and receiver devices
  2. Modems or routers
  3. Communication medium (channel)

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 113

  1. Describe an intelligent terminal.

Answer: An intelligent terminal, a workstation, or a personal computer serves as an input/output device or as a stand-alone system. Using this type of device, a remote computer can perform certain processing tasks without the main computer’s support. Generally, an intelligent terminal is considered a step up from a smart terminal.

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 113

  1. How do cable modems connect users to the Internet?

Answer: Cable modems use the same cable that connects to TVs for Internet connections and can usually reach transmission speeds of about 16 Mbps.

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 114

  1. Describe the main advantage and disadvantage of a centralized processing system.

Answer: The main advantage of a centralized processing system is being able to exercise tight control over system operations and applications. The main disadvantage is lack of responsiveness to users’ needs, because the system and its users could be located far apart from each other.

Chapter Learning Outcome: 6.3: Describe the major types of processing configurations.

Topic: Processing Configurations

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 115

  1. In the context of a communication medium, what is the difference between a point-to-point and a multipoint system?

Answer: In a point-to-point system, only one device at a time uses the medium. In a multipoint system, several devices share the same medium, and a transmission from one device can be sent to all other devices sharing the link.

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 115

  1. List three drawbacks of decentralized systems.

Answer: Decentralized systems have some drawbacks, including lack of coordination among organizational units, the high cost of having many systems, and duplication of efforts.

Chapter Learning Outcome: 6.3: Describe the major types of processing configurations.

Topic: Processing Configurations

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 115

  1. Describe the responsibilities of the transport layer of the Open Systems Interconnection (OSI) model.

Answer: The transport layer generates the receiver’s address and ensures the integrity of messages by making sure packets are delivered without error, in sequence, and with no loss or duplication. This layer provides methods for controlling data flow, ordering received data, and acknowledging received data.

Chapter Learning Outcome: 6.3: Describe the major types of processing configurations.

Topic: Processing Configurations

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 117

  1. What are the major types of networks?

Answer: There are three major types of networks: local area networks (LANs), wide area networks (WANs), and metropolitan area networks (MANs).

Chapter Learning Outcome: 6.4: Explain the three types of networks.

Topic: Types of Networks

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 117

  1. Define a wide area network (WAN) and discuss its typical transfer speeds.

Answer: A wide area network (WAN) can span several cities, states, or even countries, and it is usually owned by several different parties. The data transfer speed depends on the speed of its interconnections (called “links”) and can vary from 28.8 Kbps to 155 Mbps.

Chapter Learning Outcome: 6.4: Explain the three types of networks.

Topic: Types of Networks

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 118

  1. Describe a star topology.

Answer: A star topology usually consists of a central computer (host computer, often a server) and a series of nodes (typically workstations or peripheral devices). The host computer supplies the main processing power. A node failing does not affect the network’s operation, but if the host computer fails, the entire network goes down.

Chapter Learning Outcome: 6.5: Describe the main network topologies.

Topic: Network Topologies

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 119

  1. Describe a mesh topology and its advantages.

Answer: In a mesh topology (also called “plex” or “interconnected”), every node (which can differ in size and configuration from the others) is connected to every other node. This topology is highly reliable. Failure of one or a few nodes does not usually cause a major problem in network operation because many other nodes are available.

Chapter Learning Outcome: 6.5: Describe the main network topologies.

Topic: Network Topologies

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 121

  1. What are the disadvantages of centralized routing?

Answer: As with all centralized configurations, there are disadvantages to having control at one node. For example, if the network routing manager is at a point far from the network’s center, many links and paths that make up the network are far from the central node. Status information sent by other nodes to initiate changes to the routing table have to travel a long distance to the central node, causing a delay in routing some data and reducing network performance. In addition, if the controlling node fails, no routing information is available.

Chapter Learning Outcome: 6.6: Explain important networking concepts, such as bandwidth, routing, routers, and the client/server model.

Topic: Major Networking Concepts

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 122

  1. How is a Service Set Identifier (SSID) used to improve the security of a wireless network?

Answer: All client computers that try to access the AP are required to include an SSID in all their packets. A packet without an SSID is not processed by the AP. The major weakness of using an SSID is that it can be picked up by other devices within the range, given the right software.

Chapter Learning Outcome: 6.7: Discuss the importance of wireless security and the techniques used.

Topic: Wireless Security

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 130

  1. List the common applications of convergence.

Answer: Common applications of convergence include the following:

  1. E-commerce
  2. More entertainment options as the number of TV channels substantially increases and movies and videos on demand become more available
  3. Increased availability and affordability of video and computer conferencing
  4. Consumer products and services, such as virtual classrooms, telecommuting, and virtual reality

Chapter Learning Outcome: 6.9: Summarize the convergence phenomenon and its applications for business and personal use.

Topic: Convergence of Voice, Video, and Data

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 131

ESSAY

  1. Discuss the various forms of sender and receiver devices.

Answer: A sender and receiver device can take various forms:

  1. An input/output device, or “thin client,” is used only for sending or receiving information; it has no processing power.

  1. A smart terminal is an input/output device that can perform certain processing tasks, but it is not a full-featured computer. This type of device is often used on factory floors and assembly lines for collecting data and transmitting it to the main computer system.

  1. An intelligent terminal, a workstation, or a personal computer serves as an input/output device or as a stand-alone system. Using this type of device, a remote computer can perform certain processing tasks without the main computer’s support. Generally, an intelligent terminal is considered a step up from a smart terminal.

  1. A netbook computer is a low-cost, diskless computer used to connect to the Internet or a local area network (LAN). It runs software off a server and saves data to a server.

  1. Minicomputers, mainframes, and supercomputers process data and send it to other devices, or receive data that has been processed elsewhere, process it, then transmit it to other devices.

  1. Smartphones are mobile phones with advanced capabilities, such as e-mail and Web-browsing, and most have a built-in keyboard or an external USB keyboard. A video game console is an electronic device for playing video games. It receives instructions from a game player and produces a video display signal on a monitor such as a television screen or a computer monitor.

Chapter Learning Outcome: 6.2: Explain the major components of a data communication system.

Topic: Basic Components of a Data Communication System

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 113

  1. Explain the advantages of distributed processing.

Answer: The advantages of distributed processing include:

  1. Accessing unused processing power is possible.
  2. Modular design means computer power can be added or removed based on need.
  3. Distance and location are not limiting.
  4. It is more compatible with organizational growth because workstations can be added easily.
  5. Fault tolerance is improved because of the availability of redundant resources.
  6. Resources, such as high-quality laser printers, can be shared to reduce costs.
  7. Reliability is improved because system failures can be limited to only one site.
  8. The system is more responsive to user needs.

Chapter Learning Outcome: 6.3: Describe the major types of processing configurations.

Topic: Processing Configurations

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 116

  1. Describe the ring topology.

Answer: In a ring topology, no host computer is required because each computer manages its own connectivity. Computers and devices are arranged in a circle so each node is connected to two other nodes: its upstream neighbor and its downstream neighbor. Transmission is in one direction, and nodes repeat a signal before passing it to the downstream neighbor. If any link between nodes is severed, the entire network is affected, and failure of a single node disrupts the entire network. A token ring is a common implementation of the ring topology. Modern ring topologies, such as Fiber Distributed Data Interface (FDDI), are capable of bidirectional transmission (clockwise and counterclockwise), which prevents the problems caused by a single node failure.

Chapter Learning Outcome: 6.5: Describe the main network topologies.

Topic: Network Topologies

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 120

  1. Describe a router.

Answer: A router is a network connection device containing software that connects network systems and controls traffic flow between them. The networks being connected can be operating on different protocols, but they must use a common routing protocol. Routers operate at the Network layer of the Open Systems Interconnection (OSI) model and handle routing packets on a network. Cisco Systems and Juniper Networks are two major vendors of routers.

Chapter Learning Outcome: 6.6: Explain important networking concepts, such as bandwidth, routing, routers, and the client/server model.

Topic: Major Networking Concepts

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 123

  1. Describe the two categories of wireless technologies.

Answer: Wireless LANs (WLANs)—These networks are becoming an important alternative to wired LANs in many companies. Like their wired counterparts, WLANs are characterized by having one owner and covering a limited area.

Wireless WANs (WWANs)—These networks cover a broader area than WLANs and include the following devices: cellular networks, cellular digital packet data (CDPD), paging networks, personal communication systems (PCS), packet radio networks, broadband personal communications systems (BPCS), microwave networks, and satellite networks.

Chapter Learning Outcome: 6.7: Describe wireless and mobile technologies and networks.

Topic: Wireless and Mobile Networks

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 127

Chapter 7: The Internet, Intranets, and Extranets

TRUE/FALSE

  1. The Internet is owned or run by the Advanced Research Projects Agency Network (ARPANET).

Answer: False

Chapter Learning Outcome: 7.1: Describe the makeup of the Internet and the World Wide Web.

Topic: The Internet and the World Wide Web

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 137

Feedback: No one actually owns or runs the Internet.Each network is administered and funded locally.

  1. The National Science Foundation (NSF) initially restricted Internet use to commercial institutions.

Answer: False

Chapter Learning Outcome: 7.1: Describe the makeup of the Internet and the World Wide Web.

Topic: The Internet and the World Wide Web

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 138

Feedback: The National Science Foundation (NSF) initially restricted Internet use to research and to educational institutions; commercial use was not allowed.

  1. The World Wide Web (WWW) changed the Internet by introducing a graphical interface to the largely text-based Internet.

Answer: True

Chapter Learning Outcome: 7.1: Describe the makeup of the Internet and the World Wide Web.

Topic: The Internet and the World Wide Web

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 138

Feedback: The World Wide Web (WWW, or “the Web”) changed the Internet in 1989 by introducing a graphical interface to the largely text-based Internet.

  1. A client can be a home computer or a node in an organization’s local area network (LAN).

Answer: True

Chapter Learning Outcome: 7.1: Describe the makeup of the Internet and the World Wide Web.

Topic: The Internet and the World Wide Web

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 139

Feedback: A client can be a home computer or a node in an organization’s local area network (LAN).

  1. Hypermedia documents can only be stored at the site where they were created.

Answer: False

Chapter Learning Outcome: 7.1: Describe the makeup of the Internet and the World Wide Web.

Topic: The Internet and the World Wide Web

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 139

Feedback: The most exciting feature of the Web is that hypermedia documents can be stored anywhere in the world, so users can jump from a site in the United States to a site in Paris, France, in just a few milliseconds.

  1. In the universal resource locator (URL) http://www.csub.edu, csub is the top-level domain.

Answer: False

Chapter Learning Outcome: 7.1: Describe the makeup of the Internet and the World Wide Web.

Topic: The Internet and the World Wide Web

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 140

Feedback: In the universal resource locator (URL) http://www.csub.edu, .edu is the top-level domain.

  1. Spaces can be used in domain names.

Answer: False

Chapter Learning Outcome: 7.1: Describe the makeup of the Internet and the World Wide Web.

Topic: The Internet and the World Wide Web

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 140

Feedback: Combinations of letters, the numerals 0 through 9, and hyphens can be used in domain names. Spaces are not allowed.

  1. .org is a generic top-level domain name that is used for backbone, regional, and commercial networks.

Answer: False

Chapter Learning Outcome: 7.1: Describe the makeup of the Internet and the World Wide Web.

Topic: The Internet and the World Wide Web

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 140

Feedback: .org is a domain name that is used for organizations such as research and nonprofit organizations. The .net domain name is used for backbone, regional, and commercial networks.

  1. The top level domains (TLDs) can be in any language or character set and can contain any phrase, including a company or brand name.

Answer: True

Chapter Learning Outcome: 7.1: Describe the makeup of the Internet and the World Wide Web.

Topic: The Internet and the World Wide Web

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 140

Feedback: The top level domains (TLDs) can be in any language or character set and can contain any phrase, including a company or brand name.

  1. Asymmetric DSL (ADSL) has a higher transmission rate upstream than downstream.

Answer: False

Chapter Learning Outcome: 7.1: Describe the makeup of the Internet and the World Wide Web.

Topic: The Internet and the World Wide Web

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 141

Feedback: Asymmetric DSL (ADSL) has a lower transmission rate upstream (3.5 Mbps) than downstream (typically 24 Mbps).

  1. A T3 line uses two pairs of copper wires to carry up to 24 simultaneous conversations and has a transmission rate of 1.544 Mbps.

Answer: False

Chapter Learning Outcome: 7.1: Describe the makeup of the Internet and the World Wide Web.

Topic: The Internet and the World Wide Web

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 141

Feedback: T1 uses two pairs of copper wires to carry up to 24 simultaneous conversations (called channels) and has a transmission rate of 1.544 Mbps. A T3 line is a digital communication link that supports transmission rates of 43–45 Mbps.

  1. Crawlers can go through the other pages that are part of a Web site, as long as there are links to those pages.

Answer: True

Chapter Learning Outcome: 7.2: Discuss navigational tools, search engines, and directories.

Topic: Navigational Tools, Search Engines, and Directories

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 142

Feedback: Crawlers can go through the other pages that are part of a Web site, as long as there are links to those pages.

  1. A human-powered directory uses crawlers to collect data.

Answer: False

Chapter Learning Outcome: 7.2: Discuss navigational tools, search engines, and directories.

Topic: Navigational Tools, Search Engines, and Directories

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 143

Feedback: A human-powered directory does not use crawlers to collect data; instead, it relies on users to supply the data.

  1. Open Directory is an example of an automated directory.

Answer: False

Chapter Learning Outcome: 7.2: Discuss navigational tools, search engines, and directories.

Topic: Navigational Tools, Search Engines, and Directories

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 143

Feedback: Open Directory is an example of a human-powered directory.

  1. Client-based e-mail enables a user to access his or her e-mail account from any computer.

Answer: False

Chapter Learning Outcome: 7.3: Describe common Internet services.

Topic: Internet Services

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 143

Feedback: Web-based e-mail enables a user to access his or her e-mail account from any computer.

  1. Some Instant Messaging (IM) applications have features for audio or video conversations.

Answer: True

Chapter Learning Outcome: 7.3: Describe common Internet services.

Topic: Internet Services

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 144

Feedback: Some Instant Messaging (IM) applications have features for audio or video conversations.

  1. Using Voice over Internet Protocol (VoIP) for international and long-distance calls is more expensive than a standard telephone service.

Answer: False

Chapter Learning Outcome: 7.3: Describe common Internet services.

Topic: Internet Services

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 145

Feedback: Using Voice over Internet Protocol (VoIP) for international and long-distance calls is less expensive than a standard telephone service, because access to the Internet is available at local phone connection rates.

  1. Voice over Internet Protocol (VoIP) is used to route traffic starting and ending at conventional public switched telephone network (PSTN) phones.

Answer: True

Chapter Learning Outcome: 7.3: Describe common Internet services.

Topic: Internet Services

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 145

Feedback: Voice over Internet Protocol (VoIP) is used to route traffic starting and ending at conventional public switched telephone network (PSTN) phones.

  1. Online degree programs adversely affect colleges and universities that are facing an enrollment decline.

Answer: False

Chapter Learning Outcome: 7.4: Summarize widely used Web applications.

Topic: Web Applications

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 146

Feedback: Online degree programs help colleges and universities facing an enrollment decline, because they make it possible for students who could not attend school otherwise to enroll in classes.

  1. Telepresence surgery allows surgeons to operate all over the world without physically traveling anywhere.

Answer: True

Chapter Learning Outcome: 7.4: Summarize widely used Web applications.

Topic: Web Applications

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 148

Feedback: Telepresence surgery, as it is called, allows surgeons to operate all over the world without physically traveling anywhere.

  1. An intranet is similar to a local area network (LAN), although it uses different physical connections.

Answer: False

Chapter Learning Outcome: 7.5: Explain the purpose of intranets.

Topic: Intranets

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 149

Feedback: An intranet is different from a local area network (LAN), although it uses the same physical connections.

  1. An intranet is an application or service that uses an organization’s computer network.

Answer: True

Chapter Learning Outcome: 7.5: Explain the purpose of intranets.

Topic: Intranets

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 149

Feedback: An intranet is an application or service that uses an organization’s computer network.

  1. Although intranets are physically located in an organization, they can span the globe, allowing remote users to access the intranet’s information.

Answer: True

Chapter Learning Outcome: 7.5: Explain the purpose of intranets.

Topic: Intranets

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 149

Feedback: Although intranets are physically located in an organization, they can span the globe, allowing remote users to access the intranet’s information. However, carefully defining and limiting access is important for security reasons, so intranets are typically set up behind a firewall.

  1. Intranets are typically set up behind a firewall.

Answer: True

Chapter Learning Outcome: 7.5: Explain the purpose of intranets.

Topic: Intranets

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 149

Feedback: Carefully defining and limiting access is important for security reasons, so intranets are typically set up behind a firewall.

  1. The speed of the Internet is usually faster than that of an intranet.

Answer: False

Chapter Learning Outcome: 7.5: Explain the purpose of intranets.

Topic: Intranets

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 150

Feedback: The speed of an intranet is usually faster than that of the Internet.

  1. The Internet and an intranet use similar languages for developing applications.

Answer: True

Chapter Learning Outcome: 7.5: Explain the purpose of intranets.

Topic: Intranets

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 150

Feedback: The Internet and an intranet use similar languages for developing applications, such as Java, and offer files in similar formats.

  1. The Internet is a private network, while an intranet is a public network.

Answer: False

Chapter Learning Outcome: 7.5: Explain the purpose of intranets.

Topic: Intranets

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 150

Feedback: The Internet is a public network; an intranet is a private network.

  1. Extranets result in high internetworking costs for companies, which subsequently lead to increased losses.

Answer: False

Chapter Learning Outcome: 7.6: Explain the purpose of extranets.

Topic: Extranets

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 151

Feedback: Extranets not only allow companies to reduce internetworking costs, they give companies a competitive advantage, which can lead to increased profits.

  1. Extranets facilitate information exchange among business partners.

Answer: True

Chapter Learning Outcome: 7.6: Explain the purpose of extranets.

Topic: Extranets

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 151

Feedback: Extranets are considered a type of interorganizational system (IOS). These systems facilitate information exchange among business partners.

  1. The Internet of Everything (IOE) explicitly refers to the physical objects that are connected to the Internet.

Answer: False

Chapter Learning Outcome: 7.8: Describe the Internet of Everything.

Topic: The Internet of Everything: The Next Big Network

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 157

Feedback: The Internet of Things (IoT) refers to the physical objects that are connected to the Internet and, therefore, to all the other physical objects. The Internet of Everything (IOE) refers to a Web-based development in which people, processes, data, and things are interconnected via the Internet.

MULTIPLE CHOICE

  1. The Web organizes information by using _____, meaning documents that include embedded references to audio, text, images, video, or other documents.
a.spywarec.newsgroups
b.hypermediad.kernels

Answer: B

Chapter Learning Outcome: 7.1: Describe the makeup of the Internet and the World Wide Web.

Topic: The Internet and the World Wide Web

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 138

Feedback: The Web organizes information by using hypermedia, meaning documents that include embedded references to audio, text, images, video, or other documents.

  1. The embedded references in hypermedia documents are called _____; they consist of links users can click to follow a particular thread (topic).
a.codetextc.hypertext
b.plaintextd.ciphertext

Answer: C

Chapter Learning Outcome: 7.1: Describe the makeup of the Internet and the World Wide Web.

Topic: The Internet and the World Wide Web

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 138

Feedback: The embedded references in hypermedia documents are called hypertext; they consist of links users can click to follow a particular thread (topic).

  1. _____ is an approach to data management, in which data is stored in a network of nodes connected by links.
a.Codetextc.Hypertext
b.Plaintextd.Ciphertext

Answer: C

Chapter Learning Outcome: 7.1: Describe the makeup of the Internet and the World Wide Web.

Topic: The Internet and the World Wide Web

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 139

Feedback: Hypertext is an approach to data management, in which data is stored in a network of nodes connected by links.

  1. Any computer that stores hypermedia documents and makes them available to other computers on the Internet is called a _____.
a.clientc.node
b.serverd.domain

Answer: B

Chapter Learning Outcome: 7.1: Describe the makeup of the Internet and the World Wide Web.

Topic: The Internet and the World Wide Web

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 139

Feedback: Any computer that stores hypermedia documents and makes them available to other computers on the Internet is called a server or Web server, and computers requesting these documents are called clients.

  1. _____ are unique identifiers of computer or network addresses on the Internet.
a.Domain namesc.Log files
b.Prototypesd.Kernels

Answer: A

Chapter Learning Outcome: 7.1: Describe the makeup of the Internet and the World Wide Web.

Topic: The Internet and the World Wide Web

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 139

Feedback: Domain names, such as IBM.com or whitehouse.gov, are unique identifiers of computer or network addresses on the Internet.

  1. DNS (Domain Name System) servers translate all domain names into _____.
a.IP addressesc.cookies
b.hypermediad.proxy servers

Answer: A

Chapter Learning Outcome: 7.1: Describe the makeup of the Internet and the World Wide Web.

Topic: The Internet and the World Wide Web

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 140

Feedback: DNS (Domain Name System) servers translate all domain names into IP addresses.

  1. A(n) _____ is the address of a document or site on the Internet.
a.top level domain (TLD)c.Internet protocol (IP)
b.uniform resource locator (URL)d.Really Simple Syndication (RSS) feed

Answer: B

Chapter Learning Outcome: 7.1: Describe the makeup of the Internet and the World Wide Web.

Topic: The Internet and the World Wide Web

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 140

Feedback: A uniform resource locator (URL) is the address of a document or site on the Internet.

  1. Which of the following can be used in domain names?
a.Spacesc.Asterisks
b.Hyphensd.Apostrophes

Answer: B

Chapter Learning Outcome: 7.1: Describe the makeup of the Internet and the World Wide Web.

Topic: The Internet and the World Wide Web

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 140

Feedback: Combinations of letters, the numerals 0 through 9, and hyphens can be used in domain names. Spaces are not allowed.

  1. The _____ denotes the type of organization or country the address of a document or site on the Internet specifies.
a.top-level domain (TLD)c.Post Office Protocol (POP)
b.network interface card (NIC)d.Code Division Multiple Access (CDMA)

Answer: A

Chapter Learning Outcome: 7.1: Describe the makeup of the Internet and the World Wide Web.

Topic: The Internet and the World Wide Web

BUSPROG: Technology

Bloom’s: Remember

Difficulty Level: Easy

Page: 140

Feedback: The top-level domain (TLD) denotes the type of organization or country the address of a document or site on the Internet specifies.

  1. Which of the following statements is true of geographic top level domain (TLDs)?
a.Geographic TLDs are used to promote business and tourism.c.Geographic TLDs are limited to members of a defined community.
b.Geographic TLDs are owned by corporations to control use of their brands.d.Geographic TLDs are denoted by .Spanish or .Persian.

Answer: A

Chapter Learning Outcome: 7.1: Describe the makeup of the Internet and the World Wide Web.

Topic: The Internet and the World Wide Web

BUSPROG: Technology

Bloom’s: Understand

Difficulty Level: Moderate

Page: 140

Feedback: Geographic TLDs (e.g., .London or .Madrid) are owned by cities and geographic regions and are used to promote business and tourism.

  1. In the URL, http://www.csub.edu/~ hbidgoli/books.html, _____ represents the name of the directory in which files are stored.

width="24">d.b.<="" >www.csub.edu<="" a><="" >books.html<="" tr><="" tbody><="" table>

<="" p>

<="" p>

answer:="" c<="" p>

chapter="" learning="" outcome:="" 7.1:="" describe="" the="" makeup="" of="" internet="" and="" world="" wide="" web.<="" p>

topic:="" web<="" p>

busprog:="" technology<="" p>

bloom’s:="" remember<="" p>

difficulty="" level:="" easy<="" p>

page:="" 140–141<="" p>

feedback:="" in="" url,="" http:="" www.csub.edu<="" a>="" ~="" hbidgoli="" books.html<="" em>,="" ~hbidgoli="" represents="" name="" directory="" which="" files="" are="" stored.<="" p>

  1. which="" following="" statements="" is="" true="" about="" communication="" lines="" used="" by="" organizations="" to="" connect="" internet?<="" li><="" ol>

a.<="" td>http<="" >c.<="" >="" ~hbidgoli<="" td><="" tr>

a="" t3="" line="" uses="" two="" pairs="" copper="" wires="" carry="" up="" 24="" simultaneous="" conversations.<="" a="" digital="" link="" that="" supports="" transmission="" rates="" 43–45="" mbps.xtagstartz="" more="" widely="" than="" t1="" line.xtagstartz="" >d.<="" actually="" consists="" 672="" channels,="" each="" supporting="" 64="" kbps.xtagstartz="" understandxtagstartz="" moderatextagstartz="" 141xtagstartz="" p>

  1. a="" _____="" an="" information="" system="" enables="" users="" retrieve="" data="" from="" web="" using="" keywords.<="" >web="" server<="" >search="" engine<="" >data="" mart<="" warehousextagstartz="" 7.2:="" discuss="" navigational="" tools,="" search="" engines,="" directories.xtagstartz="" directoriesxtagstartz="" engine,="" such="" as="" google.com="" or="" ask.com,="" terms="" p>
    1. microsoft="" explorer="" (ie),="" mozilla="" firefox,="" google="" chrome,="" apple="" safari,="" opera="" examples="" _____.<="" >directories<="" browsersxtagstartz="" enginesxtagstartz="" >uniform="" resource="" locators="" (urls)<="" 142xtagstartz="" many="" graphical="" browsers="" available,="" microsoft="" opera.xtagstartz="" p>
      1. google,="" bing,="" ask.com="" applications<="" bxtagstartz="" google,="" duckduckgo,="" terms.xtagstartz="" p>
        1. _____="" check="" see="" what="" links="" on="" user’s="" page="" make="" sure="" they="" work;="" if="" broken,="" identify="" it="" include="" this="" part="" page.<="" >crawlers<="" >nodes<="" >kernels<="" >spams<="" axtagstartz="" crawlers="" p>
          1. housed="" at="" server="" farms,="" engines="" use="" index="" coming="" crawlers.<="" >cookies<="" >spiders<="" >keywords<="" >bots<="" housed="" keywords="" directories="" update="" their="" indexes="" databases="" automatically="" reflect="" changes="" site.xtagstartz="" >cookie-based<="" >human-powered<="" >open-term<="" >crawler-based<="" dxtagstartz="" 143xtagstartz="" crawler-based="" create="" collect="" these="" crawlers.="" when="" changes,="" for="" example,="" change.xtagstartz="" protocols="" send="" e-mails?xtagstartz="" >smtp<="" >pop<="" >voip<="" 7.3:="" common="" services.xtagstartz="" servicesxtagstartz="" tcp="" ip="" provides="" several="" useful="" e-mail="" protocols,="" simple="" message="" transfer="" protocol="" (smtp)="" sending="" e-mails="" post="" office="" (pop)="" retrieving="" messages.xtagstartz="" outlook="" example="" a(n)="" program.xtagstartz="" >client-based<="" >web-based<="" client-based="" programs="" outlook,="" thunderbird,="" mail.xtagstartz="" usually="" formed="" people="" exchange="" opinions="" ideas="" specific="" topic,="" technical="" scholarly="" nature.xtagstartz="" >internet="" relay="" chats<="" >rss="" feeds<="" >instant="" messaging="" xtagendzdiscussion="" groups<="" 144xtagstartz="" discussion="" groups="" exchanging="" drawback="" telephony?xtagstartz="" >lack="" call="" forwarding="" facility<="" >higher="" costs="" with="" telephone="" networks<="" >continuously="" busy="" lines<="" >poor="" quality<="" 145xtagstartz="" only="" telephony="" quality,="" not="" good="" regular="" phone="" lines.xtagstartz="" voice="" over="" (voip)?xtagstartz="" >with="" voip,="" often="" experience="" cannot="" screen="" callers="" caller="" has="" id="" blocked.<="" quality="" significantly="" better="" can="" have="" calls="" forwarded="" anywhere="" world.xtagstartz="" (voip),="" p>
            1. the="" playing="" important="" role="" helping="" reduce="" expenses,="" because:<="" >the="" networks="" lowered="" compared="" voip.<="" applications="" be="" minimum="" costs.xtagstartz="" >there="" increase="" customer="" inconvenience.<="" >products="" services="" offered="" higher="" prices.<="" 7.4:="" summarize="" applications.xtagstartz="" current="" economic="" downturn,="" because="" also="" called="" corporate="" portal.xtagstartz="" internetxtagstartz="" >an="" intranet<="" extranetxtagstartz="" arpanetxtagstartz="" 7.5:="" explain="" purpose="" intranets.xtagstartz="" intranetsxtagstartz="" 149xtagstartz="" intranet="" >its="" access="" restricted="" approved="" users.<="" >it="" faster="" intranet.<="" limited="" geographical="" scope.xtagstartz="" less="" secure="" 150xtagstartz="" security="" considered="" type="" interorganizational="" (ios).xtagstartz="" modemxtagstartz="" 7.6:="" extranets.xtagstartz="" extranetsxtagstartz="" 151xtagstartz="" extranet="" known="" “the="" semantic="" web”?xtagstartz="" 0.0xtagstartz="" 2.0xtagstartz="" 1.0xtagstartz="" 3.0xtagstartz="" 7.7:="" trends="" 2.0,="" 3.0,="" internet2="" eras.xtagstartz="" new="" trends:="" 2.0="" 3.0="" erasxtagstartz="" 153xtagstartz="" most="" experts="" agree="" web,”="" personalization="" allows="" intelligently.xtagstartz="" goal="" tailor="" online="" searching="" requests="" users’="" patterns,="" preferences,="" needs.xtagstartz="" p>
              1. a(n)="" journal="" newsletter="" updated="" frequently="" intended="" general="" public.<="" >podcast<="" >blog<="" feedxtagstartz="" >crawler<="" 154xtagstartz="" blog="" (short="" weblog)="" site="" add,="" delete,="" sometimes="" modify="" content.xtagstartz="" >cookie<="" >wiki<="" wiki="" content.="" one="" best-known="" encyclopedia="" wikipedia.xtagstartz="" serious="" problem="" wikis?xtagstartz="" >inability="" content<="" >privacy="" concerns<="" >accuracy="" information<="" >restricted="" public<="" wikis="" information,="" allowing="" anyone="" content="" affects="" content’s="" accuracy.xtagstartz="" refer(s)="" broad="" sites="" allow="" friends,="" family,="" colleagues="" well="" meet="" similar="" interests="" hobbies.xtagstartz="" >social="" networking<="" >blogging<="" >wikis<="" 154-155xtagstartz="" social="" networking="" refers="" extensible="" markup="" language="" (xml)?xtagstartz="" >xml="" distributed="" blogs.<="" xml="" tag="" specifies="" layout="" appearance="" kind="" being="" posted="" transmitted.xtagstartz="" inflexible="" standard="" format="" information.xtagstartz="" 155xtagstartz="" unlike="" html="" tags="" specify="" appearance,="" represent="" referred="" electronic="" audio="" file="" download="" mobile="" devices="" computers.xtagstartz="" knowledgextagstartz="" 156xtagstartz="" podcast="" file,="" mp3="" even="" p>
                1. syndication="" feeds="" way="" announcing="" availability="" xtagendzdns<="" >backlink<="" >url<="" syndication="" podcast’s="" availability.xtagstartz="" p>

                  completion<="" strong><="" foundation="" network="" linked="" fiber-optic="" cables="" support="" very="" high="" bandwidth.xtagstartz="" ol>

                  <="" backbonextagstartz="" 138xtagstartz="" backbone="" bandwidth.="" all="" other="" form="" internet,="" just="" human="" nervous="" system.xtagstartz="" embedded="" references="" hypermedia="" documents="" hypertextxtagstartz="" hypertext;="" consist="" click="" follow="" particular="" thread="" (topic).xtagstartz="" p>

                  1. computers="" requesting="" clients<="" 139xtagstartz="" any="" computer="" stores="" makes="" them="" available="" computers="" server,="" clients.xtagstartz="" p>
                    1. when="" transferred="" another,="" domain="" names="" converted="" (ip)="" addresses="" protocol.<="" (dns)xtagstartz="" 139–140xtagstartz="" (dns)="" based="" possible="" find="" looking="" for.xtagstartz="" service="" user="" his="" her="" account="" and,="" some="" cases,="" store="" server.xtagstartz="" web-basedxtagstartz="" web-based="" rooms="" text="" messages="" locations="" real="" time.xtagstartz="" chat="" (irc)xtagstartz="" (irc)="" communicating="" others="" via="" private="" “chat="" room”="" internet.xtagstartz="" instant="" (im)xtagstartz="" (im)="" rather="" spoken="" telephonyxtagstartz="" conversations.="" capability="" (voip).xtagstartz="" telephony.xtagstartz="" (voip)xtagstartz="" technologies="" intranets="" business="" partners="" so="" between="" possible.xtagstartz="" consumers="" subscription="" rss="" stands="" really="" syndicationxtagstartz="" rss,="" syndication,="" service,="" selected="" delivered="" feed="" reader.xtagstartz="" local="" connection="" point-of-presence="" connects="" variety="" high-performance="" networks,="" its="" main="" function="" (i2)="" traffic="" specified="" gigapopxtagstartz="" 157xtagstartz="" gigapop="" application="" different="" share="" virtual="" environment="" created="" teleimmersionxtagstartz="" teleimmersion="" physical="" objects="" connected="" therefore,="" objects.xtagstartz="" things="" (iot)xtagstartz="" 7.8:="" everything.xtagstartz="" everything:="" next="" big="" networkxtagstartz="" (iot)="" p>

                      short="" answer<="" p>

                      1. how="" does="" hypermedia?<="" organizes="" hypermedia,="" meaning="" audio,="" text,="" images,="" video,="" documents.="" composed="" billions="" documents,="" constitutes="" large="" portion="" p>
                        1. describe="" hypertext="" (html).<="" (html)="" pages.="" defines="" page’s="" attributes.="" delineates="" section="" page,="" header="" body;="" attribute="" value,="" font="" color,="" component.xtagstartz="" p>
                          1. what="" downstream="" upstream="" rate="" high-speed="" dsl="" (vdsl)="" connection?<="" 100="" mbps="" short="" distances—for="" itu="" g.993.2="" standard.xtagstartz="" directories?xtagstartz="" organize="" into="" categories.="" there="" kinds="" web.="" first="" automated,="" crawler-based,="" use;="" creates="" collects="" p>
                            1. in="" addition="" cost="" savings,="" list="" three="" advantages="" voip="" offers="" advantages:<="" p>
                              1. users="" do="" lixtagendz
                              2. voicemails="" received="" computer.<="" li>
                              3. users="" callers,="" direct="" correct="" departments="" take="" automated="" orders.<="" major="" publishers="" provide="" sites?xtagstartz="" united="" states="" europe="" offer="" descriptions="" forthcoming="" books,="" sample="" chapters,="" ordering,="" features="" books="" certain="" topics="" authors.xtagstartz="" 145-146xtagstartz="" p>
                                1. list="" eight="" banking="" internet:<="" p>
                                  1. accessing="" around="" clock<="" li>
                                  2. viewing="" old="" transactions<="" li>
                                  3. online="" mortgage="" lixtagendz
                                  4. interactive="" tools="" designing="" savings="" plan,="" choosing="" mortgage,="" getting="" insurance="" quotes="" online<="" li>
                                  5. finding="" loan="" status="" credit="" card="" lixtagendz
                                  6. paying="" bills="" accounts<="" li>
                                  7. transferring="" funds<="" copies="" checksxtagstartz="" 147xtagstartz="" intranet?xtagstartz="" within="" organization="" (for="" ip,="" includes="" [ftp],="" smtp,="" others)="" collecting,="" storing,="" disseminating="" activities,="" sales,="" resources,="" marketing.xtagstartz="" difference="" company’s="" company="" public;="" internal="" employees.="" however,="" companies="" trusted="" intranets,="" password="" another="" authentication="" method="" protect="" confidential="" improve="" coordination="" among="" partners?xtagstartz="" extranets="" partners,="" suppliers,="" distributors,="" customers.="" critical="" made="" quickly="" decisions="" without="" delays.="" manufacturer="" coordinate="" production="" checking="" inventory="" status.xtagstartz="" 152xtagstartz="" 2.0?xtagstartz="" trend="" toward="" interactive="" traditional="" applications.="" collaboration="" e-collaboration="" key="" components="" 2.0.xtagstartz="" p>
                                    1. state="" examples.<="" purposes,="" posting="" news="" product="" development.="" open-source="" software="" packages="" creating="" mediawiki="" twiki.="" give="" customers="" information.="" motorola="" t-mobile="" set="" products="" continually="" guides,="" ebay="" wiki,="" where="" buyers="" sellers="" range="" topics.xtagstartz="" p>
                                      1. define="" networking.<="" hobbies.="" 154–155xtagstartz="" p>
                                        1. differentiate="" file.<="" subscribe="" podcast.="" time="" aggregator="" automatically,="" url,="" subscribers.="" subscribers="" then="" “sync”="" listen="" whenever="" want.xtagstartz="" learningware="" (i2).xtagstartz="" suite="" education="" accessible,="" targeting="" distance="" self-education.="" proposed="" instructional="" management="" (ims)="" students="" learn="" “anytime,="" anywhere”="" fashion.="" technology="" gives="" instructors="" teaching="" materials="" classes.xtagstartz="" p>

                                          essay<="" backbone.="" points="" (naps)="" how="" relate="" backbone?xtagstartz="" system.="" interconnected="" government,="" academic,="" commercial,="" high-capacity="" routers.xtagstartz="" p>

                                          several="" operate="" own="" backbones="" interconnect="" (naps).="" naps="" determine="" routed="" internet.="" area="" (lans)="" serve="" localized="" connections,="" backbone.<="" component="" url="" xtagstartzem>.<="" brief="" explanations="" url:xtagstartz="" p>

                                          http<="" em>—stands="" protocol,="" accessing="" sites.<="" p>

                                          —the="" www<="" em>="" www,="" web,="" <="" em>or="" emxtagendz.="" csub<="" california="" state="" university="" bakersfield.="" .xtagstartzem>edu<="" suffix="" educational="" institutions.="" together,="" xtagstartzem>csub.edu<="" uniquely="" identifies="" p>

                                          ="" emxtagendz—this="" pertaining="" author="" written="" stored.="" divided="" organization.<="" p>

                                          books.html<="" document="" itself.="" .html="" extension="" means="" document.="" servers="" long="" extensions="" display="" .xtagstartzem>htm<="" em>;="" .html<="" 140-141xtagstartz="" p>

                                          1. explain="" process="" engine="" example.<="" enters="" term,="" look="" term.="" term="" exists="" index,="" pages="" needs="" prioritizing="" close="" emma="" picture-frame="" cookies="" selling="" them.="" someone="" “picture="" frame”="" might="" emma’s="" listed,="" too.="" programmed="" try="" differentiate="" types="" terms,="" “posters,”="" “photos,”="" “images,”="" priority="" containing="" additional="" along="" frame,”="" lower="" “cookies”="" “baked="" goods”="" frame.”="" vary="" intelligence,="" why="" same="" get="" results="" engines.xtagstartz="" real-estate="" provide.xtagstartz="" millions="" up-to-date="" listings="" homes="" sale.="" review="" neighborhoods,="" schools,="" prices,="" realtors="" brokerage="" firms="" home-buying="" tips.="" tours="" houses="" sale,="" convenient="" moving="" state.="" appraisals,="" neighborhood="" school="" profiles,="" financing="" options,="" home-improvement="" advice.="" remax="" (xtagstartzem>www.remax.com>),="" century="" 21="" (<="" em><="" a>www.century21.com>),="" prudential="" xtagendzwww.prudential.com>),="" era="" xtagendzwww.era<="" a>.="" com<="" em>),="" zillow="">www.zillow.com). Learning Outcome: 7.4: Summarize widely used Web applications.xtagstartz/a>

                                            ).BUSPROG: Technologyxtagstartz/a>

                                            ).Difficulty Level: Moderatextagstartz/a>

                                            ).What are the different types of information that can be made available on an intranet to improve an organization’s efficiency and effectiveness?xtagstartz/a>

                                          ).Human resources management—401K plans, upcoming events, company’s mission statement and policies, job postings, medical benefits, orientation materials, online training sessions and materials, meeting minutes, vacation timextagstartz/a>

                                          ).Production and operations—Equipment inventory, facilities management, industry news, product catalog, project informationxtagstartz/a>

                                          ).Chapter Learning Outcome: 7.5: Explain the purpose of intranets.xtagstartz/a>

                                          ).BUSPROG: Technologyxtagstartz/a>

                                          ).Difficulty Level: Moderatextagstartz/a>

+
-
Only 0 units of this product remain

You might also be interested in