Your Question! - UTPB - Managing Information Systems

advertisement
A1
B1
C1
D1
E1
F1
G1
H1
I1
A2
B2
C2
D2
E2
F2
G2
H2
I2
A3
B3
C3
D3
E3
F3
G3
H3
I3
A4
B4
C4
D4
E4
F4
G4
H4
I4
A5
B5
C5
D5
E5
F5
G5
H5
I5
A6
B6
C6
D6
E6
F6
G6
H6
I6
A7
B7
C7
D7
E7
F7
G7
H7
I7
A8
B8
C8
D8
E8
F8
G8
H8
I8
The Game Board!

A.
B.
Telephone networks are fundamentally different
from computer networks.
True
False

A.
B.
Increasingly, voice, video, and data communications
are all based on Internet technology.
TRUE
FALSE

To create a computer network, you must have at
least two computers.


TRUE
FALSE

A.
B.
An NOS must reside on a dedicated server
computer in order to manage a network.
TRUE
FALSE

A.
B.
The WEP specification calls for an access point and
its users to share the same 40-bit encrypted
password.
TRUE
FALSE

A.
B.
Viruses can be spread through e-mail.
TRUE
FALSE

Computer worms spread much more rapidly than
computer viruses.


TRUE
FALSE

A.
B.
A hub is a networking device that connects network
components and is used to filter and forward data
to specified destinations on the network.
TRUE
FALSE

A.
B.
A hub is a networking device that connects network
components and is used to filter and forward data
to specified destinations on the network.
TRUE
FALSE

A.
B.
Central large mainframe computing has largely
replaced client/server computing
TRUE
FALSE

A.
B.
Circuit switching makes much more efficient use of
the communications capacity of a network than
does packet switching.
TRUE
FALSE

A.
B.
Mobile search makes up approximately 10% of all
Internet searches.
TRUE
FALSE

A.
B.
Two computers using TCP/IP can
communicate even if they are based on
different hardware and software platforms.
TRUE
FALSE

A.
B.
In blogging, a trackback is a list of entries in other
blogs that refer to a post in the first blog.
TRUE
FALSE

A.
B.
Coaxial cable is similar to that used for cable
television and consists of thickly insulated copper
wire.
TRUE
FALSE

A.
B.
Fiber-optic cable is more expensive and harder to install
than wire media.
TRUE
FALSE

A.
B.
The number of cycles per second that can be sent
through any telecommunications medium is
measured in kilobytes.
TRUE
FALSE

A.
B.
The Domain Name System (DNS) converts domain
names to IP addresses.
TRUE
FALSE

A.
B.
VoIP technology delivers voice information in digital
form using packet switching.
TRUE
FALSE

A.
B.
Web 3.0 is a collaborative effort to add a layer of
meaning to the existing Web in order to reduce the
amount of human involvement in searching for and
processing Web information.
TRUE
FALSE

A.
B.
C.
D.
The device that acts as a connection point between
computers and can filter and forward data to a
specified destination is called a:
hub.
switch.
router.
NIC.

The Internet is based on which three key
technologies?
TCP/IP, HTML, and HTTP
TCP/IP, HTTP, and packet switching
Client/server computing, packet switching, and the
development of communications standards for
linking networks and computers
D. Client/server computing, packet switching, and
HTTP
A.
B.
C.

A.
B.
C.
D.
The method of slicing digital messages into parcels,
transmitting them along different communication
paths, and reassembling them at their destinations is
called:
multiplexing.
packet switching.
packet routing.
ATM.

Electronic data are more susceptible to destruction,
fraud, error, and misuse because information systems
concentrate data in computer files that:
A) are usually bound up in legacy systems that are difficult
to access and difficult to correct in case of error.
B) are not secure because the technology to secure them
did not exist at the time the files were created.
C) have the potential to be accessed by large numbers of
people and by groups outside of the organization.
D) are frequently available on the Internet.

Specific security challenges that threaten the
communications lines in a client/server environment
include:
A) tapping; sniffing; message alteration; radiation.
B) hacking; vandalism; denial of service attacks.
C) theft, copying, alteration of data; hardware or
software failure.
D) unauthorized access; errors; spyware.

Specific security challenges that threaten clients in a
client/server environment include:
A) tapping; sniffing; message alteration; radiation.
B) hacking; vandalism; denial of service attacks.
C) theft, copying, alteration of data; hardware or
software failure.
D) unauthorized access; errors; spyware.

A.
B.
C.
D.
The telephone system is an example of a ________ network.
peer-to-peer
wireless
packet-switched
circuit-switched

A.
B.
C.
D.
Which of the following is not a characteristic of packet
switching?
Packets travel independently of each other.
Packets are routed through many different paths.
Packet switching requires point-to-point circuits.
Packets include data for checking transmission errors.

A.
B.
C.
D.
In TCP/IP, IP is responsible for:
disassembling and reassembling of packets during
transmission.
establishing an Internet connection between two
computers.
moving packets over the network.
sequencing the transfer of packets.

A.
B.
C.
D.
In a telecommunications network architecture, a protocol is:
a device that handles the switching of voice and data in a
local area network.
a standard set of rules and procedures for control of
communications in a network.
a communications service for microcomputer users.
the main computer in a telecommunications network.

A.
B.
C.
D.
What are the four layers of the TCP/IP reference model?
Physical, application, transport, and network interface
Physical, application, Internet, and network interface
Application, transport, Internet, and network interface
Application, hardware, Internet, and network interface

A.
B.
C.
D.
Which signal types are represented by a continuous
waveform?
Laser
Optical
Digital
Analog

A.
B.
C.
D.
To use the analog telephone system for sending digital
data, you must also use:
a modem.
a router.
DSL.
twisted wire.

A.
B.
C.
D.
Which type of network is used to connect digital
devices within a half-mile or 500-meter radius?
Microwave
LAN
WAN
MAN

A.
B.
C.
D.
Which type of network serves a small group of
computers, allowing them to share resources and
peripherals without using a dedicated server?
Peer-to-peer
Wireless
LAN
Ring

A.
B.
C.
D.
Which type of network would be most appropriate
for a business that comprised three employees and
a manager located in the same office space, whose
primary need is to share documents?
PAN
Domain-based LAN
Peer-to-peer network
Campus area network

A.
B.
C.
D.
Which of the following is considered by many
to be the defining Web 2.0 application?
Instant messaging
E-mail
Blogging
Social networking

A.
B.
C.
D.
Which of the following enables multiple users
to create and edit Web documents?
Wiki
Blog
Social networking
Pinterest

A.
B.
C.
D.
The "Internet of Things" refers to:
the increasing focus on shopping as the major user activity on the
Internet.
the microblogging trend, in which users exchange short text and
pictures rather than longer and more in-depth content and text.
a vision of a pervasive Web, in which common objects are connected to
and controlled over the Internet.
the trend away from platform-independent Web applications to mobiledevice specific apps.
You have no Question
You are an instant WINNER of
Take the
points
and
Relax!

A.
B.
C.
D.
A network that spans a city, and sometimes its
major suburbs as well, is called a:
CAN.
MAN.
LAN.
WAN.

A.
B.
C.
D.
A network that covers entire geographical regions is
most commonly referred to as a:
local area network.
intranet.
peer-to-peer network.
wide area network.

Which of the following is a challenge posed by Wi-Fi
networks?
Lack of broadband support
Connectivity issues with wired LANs
Susceptibility to interference from nearby wireless
systems
D. High cost of infrastructure technology
A.
B.
C.

Bandwidth is the:
number of frequencies that can be broadcast through a
medium.
B. number of cycles per second that can be sent through a
medium.
C. difference between the highest and lowest frequencies that
can be accommodated on a single channel.
D. total number of bytes that can be sent through a medium
per second.
A.

A.
B.
C.
D.
The total amount of digital information that can be
transmitted through any telecommunications
medium is measured in:
bps.
Hertz.
baud.
gigaflops.

A.
B.
C.
D.
Digital subscriber lines:
operate over existing telephone lines to carry voice, data,
and video.
operate over coaxial lines to deliver Internet access.
are very-high-speed data lines typically leased from longdistance telephone companies.
have up to twenty-four 64-Kbps channels.

A.
B.
C.
D.
T lines:
operate over existing telephone lines to carry voice, data, and
video.
operate over coaxial lines to deliver Internet access.
are high-speed, leased data lines providing guaranteed service
levels.
have up to twenty-four 64-Kbps channels.

A.
B.
C.
D.
Which protocol is the Internet based on?
TCP/IP
FTP
packet-switching
HTTP

A.
B.
C.
D.
What service converts IP addresses into more
recognizable alphanumeric names?
HTML
DNS
IP
HTTP

A.
B.
C.
D.
The child domain of the root is the:
top-level domain.
second-level domain.
host name.
domain extension.

A.
B.
C.
D.
In the domain name
"http://myspace.blogging.com", what are the root,
top-level, second-level, and third-level domains,
respectively?
"http://", myspace, blogging, com
"http://", com, blogging, myspace
".", com, blogging, myspace
".", myspace, blogging, com

A.
B.
C.
D.
Which organization helps define the overall structure
of the Internet?
None (no one "owns" the Internet)
W3C
ICANN
IAB

IPv6 is being developed in order to:
update the packet transmission protocols for higher
bandwidth.
B. create more IP addresses.
C. allow for different levels of service.
D. support Internet2.
A.

A.
B.
C.
D.
Which of the following services enables logging on
to one computer system and working on another?
FTP
LISTSERV
Telnet
World Wide Web

A.
B.
C.
D.
Instant messaging is a type of ________ service.
chat
cellular
e-mail
wireless

Which of the following statements about RFID is not
true?
RFIDs transmit only over a short range.
RFIDs use an antenna to transmit data.
Microchips embedded in RFIDs are used to store
data.
D. RFIDs require line-of-sight contact to be read.
A.
B.
C.

A.
B.
C.
D.
________ integrate(s) disparate channels for voice
communications, data communications, instant
messaging, e-mail, and electronic conferencing into
a single experience.
Wireless networks
Intranets
Virtual private networks
Unified communications

A VPN:
is an encrypted private network configured within
a public network.
B. is more expensive than a dedicated network.
C. provides secure, encrypted communications using
Telnet.
D. is an Internet-based service for delivering voice
communications.
A.

A.
B.
C.
D.
Web browser software requests Web pages from the
Internet using which protocol?
URL
HTTP
DNS
HTML
YOU RECEIVE NO POINTS
I got my
eye on
you!
YOU RECEIVE NO POINTS
What do
you mean!
YOU RECEIVE NO POINTS
WAIT!
I know
the
ANSWER!
Your Answer is
correct!
Total Points
10
You
Win!
Your Answer is correct!
Total Points
15
Your Answer is correct!
Total Points
You want
on our
team!
20
YOU ARE a Winner!!!
Your
Kidding!
RIGHT!
You Received
25 Points
Download