Filters
Question type

Study Flashcards

Explain the five different networking elements creating a connected world.

Correct Answer

verifed

verified

Network categories: Networks are categor...

View Answer

War consumerization is the practice of tagging pavement with codes displaying where Wi-Fi access is available.

A) True
B) False

Correct Answer

verifed

verified

VoIP allows users to ________.


A) call anyone with a local telephone number
B) call anyone with an international telephone number
C) call anyone with a cellular telephone number
D) All of these are correct.

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

What is mobile?


A) means the technology can travel with the user; for instance, users can download software, email messages, and web pages onto a laptop or other mobile device
B) refers to any type of operation accomplished without the use of a hard-wired connection
C) a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices
D) provides communication for devices owned by a single user that work over a short distance

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Network convergence includes VoIP, UC, and IPTV.

A) True
B) False

Correct Answer

verifed

verified

IP address is a unique number that identifies where computers are located on the network.

A) True
B) False

Correct Answer

verifed

verified

Which of the below is an example of P2P?


A) GoDaddy
B) Skype
C) Federal Communication Commission (FCC)
D) Facebook

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

What is a combination of HTTP and SSL that provides encryption and secure identification of an Internet server?


A) secure hypertext transfer protocol (SHTTP)
B) secure sockets layer (SSL)
C) SSL certificate
D) SHTTP certificate

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

What is the science and art of making an illustrated map or chart?


A) automatic vehicle location
B) geographic information system
C) cartography

D) A) and B)
E) A) and C)

Correct Answer

verifed

verified

Cell phones have morphed into ________ that offer more advanced computing ability and connectivity than basic cell phones.


A) micro computers
B) smart phones
C) streaming phones
D) super computers

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

The network access technologies include VoIP, UC, and IPTV.

A) True
B) False

Correct Answer

verifed

verified

Wi-Fi protected access (WAP) is an encryption algorithm designed to protect wireless transmission data.

A) True
B) False

Correct Answer

verifed

verified

What represents an east/west measurement of position?


A) estimated time of arrival
B) estimated time en route
C) latitude
D) longitude

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

What receives and repeats a signal extending its attenuation or range?


A) proxy
B) broadband over power line
C) attenuation
D) repeater

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

A semi-passive RFID tag is ________.


A) an electronic identification device that is made up of a chip and antenna
B) a transmitter/receiver that reads the contents of RFID tags in the area
C) a device that does not have a power source
D) a device that uses a battery to run the microchip's circuitry but communicates by drawing power from the RFID reader

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Companies can establish direct private network links among themselves or create private, secure Internet access, in effect a private tunnel within the Internet, called an extranet.

A) True
B) False

Correct Answer

verifed

verified

What is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves?


A) Bluetooth
B) wireless fidelity (WI-FI)
C) wide area network (WAN)
D) wireless data centers

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Telecommuting (virtual workforce) allows users to work from remote locations such as home or hotel using high-speed Internet to access business applications and data.

A) True
B) False

Correct Answer

verifed

verified

Asset tracking ________.


A) occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention
B) uses plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip
C) measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds
D) provides extremely accurate position, time, and speed, using a satellite-based navigation system

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

The main challenges facing networks include security and social, ethical, and political issues.

A) True
B) False

Correct Answer

verifed

verified

Showing 121 - 140 of 303

Related Exams

Show Answer