Filters
Question type

Study Flashcards

A metropolitan area network (MAN)is a large computer network usually spanning a city.Most colleges,universities,and large companies that span a campus use an infrastructure supported by a MAN.

A) True
B) False

Correct Answer

verifed

verified

What is a geocoin?


A) A device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds
B) An east/west measurement of position
C) A north/south measurement of position
D) A round coin-sized object,is uniquely numbered and hidden in a geocache

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

What is war driving?


A) Allows mobile voice calls to be made over broadband networks,creating-under the right network conditions-clearer audio and fewer dropped calls
B) The practice of tagging pavement with codes displaying where Wi-Fi access is available
C) Deliberately searching for Wi-Fi signals while driving by in a vehicle
D) Remotely controls smart phones and tablets,ensuring data security

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which business application uses electronic tags and labels to identify objects wirelessly over short distances?


A) Radio-frequency identification
B) Global positioning systems
C) Geographic information systems
D) Location-based services

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What is a device that enables a computer to transmit and receive data?


A) Broadband
B) Modem
C) Bandwidth
D) ISP

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

How do TCP and IP differ?


A) TCP verifies the correct delivery of data in case it is corrupted,where IP verifies the data are sent to the correct IP address.
B) TCP verifies the information is reliable,and IP verifies that the data is sent.
C) IP verifies the correct delivery of data in case it is corrupted,where TCP verifies the data are sent to the correct IP address.
D) IP verifies connectivity,and TCP verifies the rate at which the data is sent.

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

What is the standard Internet protocol,which provides the technical foundation for the public Internet?


A) Data streaming and DSL protocols
B) Transmission control protocol/Internet protocol (TCP/IP)
C) Data streaming rules and regulations
D) Internet protocol/transmission control protocol (IP/TCP)

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following allows high-speed digital data transmission over standard telephone lines?


A) Digital subscriber line (DSL)
B) Data subscription service (DSS)
C) Dominance service line (DSL)
D) Data converter input (DCI)

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is a passive RFID tags?


A) An electronic identification device that is made up of a chip and antenna
B) A transmitter/receiver that reads the contents of RFID tags in the area
C) Do not have a power source
D) Have their own transmitter and a power source (typically a battery)

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

RFID tag is an electronic identification device that is made up of a chip and antenna.

A) True
B) False

Correct Answer

verifed

verified

What represents the end of the packet or transmission end?


A) Traceroute
B) Standard packet
C) Packet header
D) Packet footer

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Passive RFID tags do not have a power source.

A) True
B) False

Correct Answer

verifed

verified

Wi-Fi protected access (WAP)is an encryption algorithm designed to protect wireless transmission data.

A) True
B) False

Correct Answer

verifed

verified

What is a utility application that monitors the network path of packet data sent to a remote computer?


A) Traceroute
B) Standard packet
C) Packet header
D) Packet footer

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the below statements is not accurate in reference to mobile and wireless computing?


A) Mobile technology can travel with the user.
B) Wireless technology is any type of operation accomplished without the use of a hard-wired connection.
C) Wireless technology is any type of operation accomplished with the use of a hard-wired connection.
D) Mobile technology allows a user to download software to a laptop or cell phone for portable reading or reference.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

What is a combination of HTTP and SSL that provides encryption and secure identification of an Internet server?


A) Secure hypertext transfer protocol (SHTTP)
B) Secure sockets layer (SSL)
C) SSL certificate
D) SHTTP certificate

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Radio-frequency identification (RFID)uses electronic tags and labels to identify objects wirelessly over short distances.

A) True
B) False

Correct Answer

verifed

verified

Active RFID tags use a battery to run the microchip's circuitry,but communicate by drawing power from the RFID reader.

A) True
B) False

Correct Answer

verifed

verified

War consumerization is the practice of tagging pavement with codes displaying where Wi-Fi access is available.

A) True
B) False

Correct Answer

verifed

verified

What is an extension of an Intranet that is available only to authorized outsiders?


A) National ISP
B) Regional ISP
C) Intranet
D) Extranet

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Showing 221 - 240 of 303

Related Exams

Show Answer