Ch.7 Networks Mobile Business Test Bank Docx - M Information Systems 5th Edition | Test Bank with Answer Key by Paige Baltzan by Paige Baltzan. DOCX document preview.
M: Information Systems, 5e (Baltzan)
Chapter 7 Networks: Mobile Business
1) The network categories include LAN, WAN, and MAN.
2) The network providers include ISP, NSP, and RSP.
3) The network access technologies include DSL, cable modem, and broadband.
4) The network protocols include TCP/IP, FTP, and DHCP.
5) Network convergence includes VoIP, UC, and IPTV.
6) The network categories include ISP, NSP, and RSP.
7) The network providers include LAN, WAN, and MAN.
8) The network access technologies include VoIP, UC, and IPTV.
9) The network protocols include LAN, WAN, and MAN.
10) Network convergence includes TCP/IP and FTP.
11) A local area network (LAN) connects a group of computers in close proximity, such as in an office building, school, or home. LANs allow sharing of files, printers, games, and other resources.
12) A wide area network (WAN) spans a large geographic area such as a state, province, or country.
13) A wide area network (WAN) connects a group of computers in close proximity, such as in an office building, school, or home.
14) A metropolitan area network (MAN) spans a large geographic area such as a state, province, or country.
15) Attenuation represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or because of radio interference or physical obstructions such as walls.
16) A repeater receives and repeats a signal to reduce its attenuation and extend its range.
17) A metropolitan area network (MAN) is a large computer network usually spanning a city. Most colleges, universities, and large companies that span a campus use an infrastructure supported by a MAN.
18) A local area network (LAN) is a large computer network usually spanning a city.
19) Network convergence is the integration of communication channels into a single service.
20) A domain name system (DNS) converts IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions.
21) A local area network (LAN) connects a group of computers in close proximity, such as in an office building, school, or home. LANs allow sharing of files, printers, games, and other resources. A LAN also often connects to other LANs, and to wide area networks.
22) A wide area network (WAN) spans a large geographic area such as a state, province, or country. Perhaps the best example is the Internet.
23) Broadband over power line (BPL) technology makes possible high-speed Internet access over ordinary residential electrical lines and offers an alternative to DSL or high-speed cable modems.
24) A repeater represents the loss of a network signal strength measured in decibels and occurs because the transmissions gradually dissipate in strength over longer distances or radio interference or physical obstructions like walls also impact communication signals.
25) A repeater receives and repeats a signal extending its attenuation or range.
26) A metropolitan area network (MAN) is a large computer network usually spanning a city.
27) Attenuation is a single unit of binary data routed through a network.
28) Packets directly impact network performance and reliability by subdividing an electronic message into smaller more manageable packets.
29) Traceroute formats include a packet header, packet body containing the original message, and packet footer.
30) The packet header lists the destination (for example in IP packets the destination is the IP address) along with the length of the message data.
31) The packet footer represents the end of the packet or transmission end. The packet header and packet footer contain error-checking information to ensure the entire message is sent and received. The receiving device reassembles the individual packets into the original by stripping off the headers and footers and then piecing together the packets in the correct sequence.
32) Dynamic host configuration protocol is a utility application that monitors the network path of packet data sent to a remote computer.
33) Telecommuting (virtual workforce) allows users to work from remote locations such as home or hotel using high-speed Internet to access business applications and data.
34) IP address is a unique number that identifies where computers are located on the network.
35) IP address is a simple network protocol that allows the transfer of files between two computers on the Internet.
36) Dynamic Host Configuration Protocol (DHCP) allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network.
37) A proxy is software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons.
38) Voice over IP (VoIP) uses IP technology to transmit telephone calls.
39) Peer-to-peer (P2P) is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server.
40) Internet Protocol TV (IPTV) distributes digital video content using IP across the Internet and private IP networks.
41) Peer-to-peer uses IP technology to transmit telephone calls.
42) Voice over IP is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server.
43) A repeater distributes digital video content using IP across the Internet and private IP networks.
44) An intranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, Web publishing, and the support of business processes.
45) An extranet is an extension of an intranet that is available only to authorized outsiders, such as customers, partners, and suppliers.
46) Companies can establish direct private network links among themselves or create private, secure Internet access, in effect a private tunnel within the Internet, called a virtual private network (VPN).
47) An extranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, Web publishing, and the support of business processes.
48) An intranet is an extension of an intranet that is available only to authorized outsiders, such as customers, partners, and suppliers.
49) Companies can establish direct private network links among themselves or create private, secure Internet access, in effect a private tunnel within the Internet, called an extranet.
50) VPNs are often used to connect to a corporate server. VPN stands for a valued partner network.
51) The main challenges facing networks include security, social, ethical, and political issues.
52) Two methods for encrypting network traffic on the Web are secure sockets layer and secure hypertext transfer protocol.
53) Secure sockets layer (SSL) is a combination of HTTP and SSL to provide encryption and secure identification of an Internet server.
54) Some of the social challenges with networking occur with newsgroups or blogs where like-minded people can exchange messages. Problems can arise when sensitive social issues become the topic of discussion such as politics or religion.
55) Mobile and wireless networks are identical and the terms can be used synonymously.
56) The Institute of Electrical and Electronics Engineers (IEEE) is an organization that researches and institutes electrical standards for communication and other technologies. Known officially as IEEE 802.11n (or wireless-N) is the newest standard for wireless networking. Compared with earlier standards like 802.11b, wireless-N offers faster speeds, more flexibility, and greater range.
57) A wireless LAN (WLAN) is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves.
58) Worldwide Interoperability for Microwave Access (WiMAX) is a communications technology aimed at providing high-speed wireless data over metropolitan area networks.
59) Mobile means the technology can travel with the user; for instance, users can download software, email messages, and web pages onto a laptop or other mobile device for portable reading or reference. Information collected while on the road can be synchronized with a PC or company server.
60) Wireless refers to any type of operation accomplished without the use of a hard-wired connection.
61) A personal area network (PAN) provides communication for devices owned by a single user that work over a short distance.
62) Bluetooth is a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices.
63) A wireless LAN (WLAN) is a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet.
64) An access point (AP) is the computer or network device that serves as an interface between devices and the network. Each computer initially connects to the access point and then to other computers on the network.
65) A wireless access point (WAP) enables devices to connect to a wireless network to communicate with each other.
66) An access point provides communication for devices owned by a single user that work over a short distance.
67) The digital divide is a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices.
68) A wireless WAN (WWAN) is a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet.
69) A voice over LTE is the computer or network device that serves as an interface between devices and the network. Each computer initially connects to the access point and then to other computers on the network.
70) A secure socket layer enables devices to connect to a wireless network to communicate with each other.
71) Wi-Fi infrastructure includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a Wi-Fi signal.
72) Hotspots are designated locations where Wi-Fi access points are publicly available.
73) A wireless MAN (WMAN) is a metropolitan area network that uses radio signals to transmit and receive data.
74) Worldwide Interoperability for Microwave Access (WiMAX) is a communications technology aimed at providing high-speed wireless data over metropolitan area networks.
75) A wireless WAN (WWAN) is a wide area network that uses radio signals to transmit and receive data.
76) Streaming is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred.
77) Voice over LTE (VoLTE) allows mobile voice calls to be made over broadband networks, creating—under the right network conditions—clearer audio and fewer dropped calls.
78) A satellite is a space station that orbits the Earth, receiving and transmitting signals from Earth-based stations over a wide area.
79) Wired equivalent privacy (WEP) is an encryption algorithm designed to protect wireless transmission data.
80) Wi-Fi protected access (WPA) is a wireless security protocol to protect Wi-Fi networks.
81) War chalking is the practice of tagging pavement with codes displaying where Wi-Fi access is available. The codes for war chalking tell other users the kind of access available, the speed of the network, and if the network is secured.
82) War driving is deliberately searching for Wi-Fi signals while driving by in a vehicle.
83) IT consumerization is the blending of personal and business use of technology devices and applications.
84) Mobile device management (MDM) remotely controls smart phones and tablets, ensuring data security.
85) Mobile application management (MAM) administers and delivers applications to corporate and personal smart phones and tablets.
86) Mobile device management is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred.
87) War driving allows mobile voice calls to be made over broadband networks, creating—under the right network conditions—clearer audio and fewer dropped calls.
88) A satellite is a space station that orbits the Sun, receiving and transmitting signals from Mars-based stations over a wide area.
89) Wi-Fi protected access (WAP) is an encryption algorithm designed to protect wireless transmission data.
90) Wired equivalent privacy (WEP) is a wireless security protocol to protect Wi-Fi networks.
91) War consumerization is the practice of tagging pavement with codes displaying where Wi-Fi access is available.
92) War chalking is deliberately searching for Wi-Fi signals while driving by in a vehicle.
93) Device customization is the blending of personal and business use of technology devices and applications.
94) Mobile application management (MAM) remotely controls smart phones and tablets, ensuring data security.
95) Mobile device management (MDM) administers and delivers applications to corporate and personal smart phones and tablets.
96) Radio-frequency identification (RFID) uses electronic tags and labels to identify objects wirelessly over short distances.
97) RFID innovations and technologies are being used in many industries including retail, hospitals, pharmaceuticals, and ranching.
98) A global positioning system (GPS) consists of hardware, software, and data that provide location information for display on a multidimensional map.
99) A geographic information system (GIS) stores, views, and analyzes geographic data, creating multidimensional charts or maps.
100) A global positioning system (GPS) is a satellite-based navigation system providing extremely accurate position, time, and speed information.
101) A great GIS example, Google Earth, combines satellite imagery, geographic data, and Google's search capabilities to create a virtual globe that users can download to a computer or mobile device.
102) GPS utilizes location-based services (LBS), applications that use location information to provide a service, whereas a GIS does not use LBS applications.
103) Passive RFID tags do not have a power source
104) Passive RFID tags have their own transmitter and a power source (typically a battery).
105) Active RFID tags use a battery to run the microchip's circuitry, but communicate by drawing power from the RFID reader.
106) Asset tracking occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items location with little or no manual intervention.
107) RFID accelerometer is a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds.
108) Active RFID tags do not depend on a silicon microchip and use plastic or conductive polymers instead of silicon-based microchips allowing them to be washed or exposed to water without damaging the chip.
109) An RFID tag is an electronic identification device that is made up of a chip and antenna.
110) An RFID reader (RFID interrogator) is a transmitter/receiver that reads the contents of RFID tags in the area. A RFID system is comprised of one or more RFID tags, one or more RFID readers, two or more antennas.
111) Automatic vehicle location (AVL) uses GPS tracking to track vehicles.
112) Geographic information system (GIS) stores, views, and analyzes geographic data creating multidimensional charts or maps. For example, GIS are monitoring global warming by measuring the speed of glaciers melting in Canada, Greenland, and Antarctica.
113) Cartography is the science and art of making an illustrated map or chart. GIS allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps.
114) Traceroute occurs when paper maps are laid edge-to-edge and items that run across maps do not match are reconfigured to match.
115) GIS map automation links business assets to a centralized system where they can be tracked and monitored over time.
116) Spatial data (geospatial data or geographic information) identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more. Spatial data can be mapped and is stored as coordinates and topology. A GIS accesses, manipulates, and analyzes spatial data.
117) WiMAX is a coding process that takes a digital map feature and assigns it an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category). GIS professionals are certified in geocoding practices to ensure industry standards are met when classifying spatial data.
118) Longitude represents a north/south measurement of position.
119) Latitude represents an east/west measurement of position.
120) Geocache is a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find. GPS users find the geocache and typically sign a guest book or take an item and leave an item for the next adventure players to find. Caches are often placed in locations that are interesting or challenging for people to discover.
121) A geocoin, a round coin-sized object, is uniquely numbered and hidden in geocache. Geocoins can also be shaped to match a theme like the state of Colorado or a birthday party hat. Geocoins are often decorative or commemorative, making them collectible and highly valuable for technology adventures.
122) Estimated-time-of-arrival (ETA) is the time of day of an expected arrival at a certain destination and is typically used for navigation applications.
123) Estimated-time-enroute (ETE) is the time remaining before reaching a destination using the present speed and is typically used for navigation applications.
124) LBS differ from RFID in that an LBS cannot track and monitor objects such as inventory.
125) With the power of a wireless network, business professionals can take advantage of mobility allowing them to work from anywhere, at any time, using many different devices.
126) Which of the following includes the three primary network categories?
A) LAN, WAN, SAN
B) LAN, WAN, MAN
C) LAN, SAN, XAN
D) LAN, WAN, XAN
127) Which of the following includes the three primary network access technologies?
A) DSL, cable modem, broadband
B) LAN, WAN, MAN
C) VoIP, UC, IPTV
D) TCP/IP, FTP, DHCP
128) Which of the following includes the three primary network providers?
A) DSL, cable modem, broadband
B) LAN, WAN, MAN
C) VoIP, UC, IPTV
D) ISP, NSP, RSP
129) Which of the following includes the three forms of primary network convergence?
A) DSL, cable modem, broadband
B) LAN, WAN, MAN
C) VoIP, UC, IPTV
D) TCP/IP, FTP, DHCP
130) Which of the following includes the three primary network categories?
A) DSL, cable modem, broadband
B) LAN, WAN, MAN
C) VoIP, UC, IPTV
D) TCP/IP, FTP, DHCP
131) Which of the following includes the three primary network protocols?
A) DSL, cable modem, broadband
B) LAN, WAN, MAN
C) VoIP, UC, IPTV
D) TCP/IP, FTP, DHCP
132) What is a large computer network usually spanning a city or a specific infrastructure like a college?
A) metropolitan area network (MAN)
B) local area network (LAN)
C) wide area network (WAN)
D) secure area network (SAN)
133) What spans a large geographic area such as a state, province, or country, similar to the Internet?
A) metropolitan area network (MAN)
B) local area network (LAN)
C) wide area network (WAN)
D) secure area network (SAN)
134) What connects a group of computers in close proximity, such as in a school or office setting?
A) metropolitan area network (MAN)
B) local area network (LAN)
C) wide area network (WAN)
D) secure area network (SAN)
135) What are the five elements that are needed to create a connected world or a network?
A) categories, programs, alternatives, people, and core philosophy
B) program, providers, access, mechanics, and teachers
C) categories, providers, access technologies, protocols, and convergence
D) LAN, WAN, MAN, PAN, and SAN
136) LANs, WANs, and MANs all provide users with an accessible and reliable network infrastructure. Which of the below are the most important network differentiating dimensions?
A) reliability and timing
B) confidentiality and performance
C) security and cost
D) cost and performance
137) What is the largest and most important network that has evolved into a global information superhighway?
A) Internet
B) intranet
C) extranet
D) LAN
138) Which of the below offers a common example of a LAN?
A) college campus
B) home office
C) city library
D) all of these
139) Which of the below offers an example of a WAN?
A) the Internet
B) Microsoft's main campus in Washington
C) the city of Denver's court and police departments
D) all of these
140) Which of the below offers a common example of a WAN?
A) college campus
B) home office
C) city library
D) the Internet
141) Which of the below offers an example of a LAN?
A) the Internet
B) Microsoft's main campus in Washington
C) the city of Denver's court and police departments
D) college campus
142) Which of the below is a WAN?
A) home office
B) business office
C) college dorm room
D) the Internet
143) The Internet is a hierarchical structure linking different levels of service providers whose millions of devices supply all the interconnections. The three levels outlined in the book from the top down include
A) new system provider (NSP), current system provider (CSP), and order entry system provider (OSP)
B) national service provider (NSP), regional service provider (RSP), and Internet service provider (ISP)
C) net server point (NSP), radio server point (RSP), and Internet server point (ISP)
D) none of these
144) What measures network performance by the maximum amount of data that can pass from one point to another in a unit of time?
A) bandwidth
B) frequency
C) access
D) protocol
145) The speed of transmission of a network is determined by the speed of its smallest
A) unit of time.
B) number of computers.
C) amount of bandwidth.
D) number of customers.
146) What is a device that enables a computer to transmit and receive data?
A) broadband
B) modem
C) bandwidth
D) ISP
147) Which of the following terms refers to the smallest element of data and has a value of either 0 or 1?
A) bit
B) bandwidth
C) modem
D) Internet protocol
148) What measures bandwidth in terms of numbers transferred or received per unit of time?
A) connection time
B) broadband
C) protocol
D) bit rate
149) What is a high-speed Internet connection that is always connected and has a bandwidth greater than 2 Mbps?
A) analog
B) dial up
C) broadband
D) protocol
150) What are the two most prevalent types of broadband access?
A) data subscriber and cable connection
B) digital subscriber line and cable connection
C) digital line and client line
D) digital server and client server
151) Which of the following allows high-speed digital data transmission over standard telephone lines?
A) digital subscriber line (DSL)
B) data subscription service (DSS)
C) dominance service line (DSL)
D) data converter input (DCI)
152) Which of the following provides Internet access using a cable television company's infrastructure and a special cable modem?
A) ISP cable box
B) Internet cable connection
C) satellite cable box
D) satellite cable connection
153) Which of the below allows a user to access the Internet?
A) dial-up connection
B) cable
C) T1 line
D) all of these
154) Which of the following is a type of data connection able to transmit a digital signal at 1.544 Mpbs and is more expensive and reliable than cable or DSL?
A) T1 line
B) dial-up line
C) modem line
D) all of these
155) What is the standard that specifies the format of data as well as the rules to be followed during transmission?
A) bandwidth
B) bit rate
C) protocol
D) transmission record
156) What is the standard Internet protocol, which provides the technical foundation for the public Internet?
A) Data streaming and DSL protocols
B) Transmission control protocol/Internet protocol (TCP/IP)
C) Data streaming rules and regulations
D) Internet protocol/Transmission control protocol (IP/TCP)
157) How do TCP and IP differ?
A) TCP verifies the correct delivery of data in case it is corrupted, where IP verifies the data are sent to the correct IP address.
B) TCP verifies the information is reliable, and IP verifies that the data is sent.
C) IP verifies the correct delivery of data in case it is corrupted, where TCP verifies the data are sent to the correct IP address.
D) IP verifies connectivity, and TCP verifies the rate at which the data is sent.
158) What is the conversion of IP addresses that identifies labels that use a variety of recognizable naming conventions?
A) domain grades
B) URL spaces
C) domain national sequences (DNS)
D) domain name system (DNS)
159) Which domain is reserved for U.S. government agencies?
A) .info
B) .USA
C) .gov
D) .US
160) Which domain is the most common and reserved for commercial organizations and businesses?
A) .net
B) .com
C) .biz
D) .org
161) Which domain is reserved for accredited postsecondary institutions?
A) .mil
B) .edu
C) .biz
D) .org
162) Which domain is reserved for the U.S. military?
A) .mil
B) .gov
C) .org
D) .age
163) What is the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures?
A) network protocol
B) networking category
C) network convergence
D) network communication
164) What is a benefit of network convergence?
A) the weaving together of voice, data, and video
B) multiple services offered from a single vendor
C) multiple devices supported by one provider
D) all of these
165) What is a benefit of network convergence?
A) the uncoupling of voice, data, and video service
B) multiple services offered from several different vendors
C) multiple devices supported by one provider
D) all of these
166) What is the integration of communication channels into a single service?
A) instant communication
B) unified communication
C) peer-to-peer communication
D) voice over communication
167) What is VoIP?
A) VoIP uses IP technology to transmit telephone calls.
B) VoIP offers the low cost ability to receive personal and business calls via computer.
C) VoIP offers the ability to have more than one phone number.
D) VoIP offers all of these.
168) What is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server?
A) peer-to-peer (P2P)
B) voice over IP (VoIP)
C) Internet protocol TV (IPTV)
D) all of these
169) Which of the below is an example of P2P?
A) GoDaddy
B) Skype
C) Federal Communication Commission (FCC)
D) Facebook
170) Which statement below is inaccurate in reference to domain names?
A) Domain names are rented.
B) Domain names are owned.
C) Domain names are renewable.
D) GoDaddy is a popular domain name registrar.
171) What can unified communications merge?
A) iming
B) video conferencing
C) voice mail
D) all of these
172) Which of the below statements is inaccurate in reference to unified communications?
A) UC decreases communication costs.
B) UC enhances the way individuals communicate.
C) UC enhances the way individuals collaborate.
D) UC increases communication expenses.
173) VoIP allows users to
A) call anyone with a local telephone number.
B) call anyone with an international telephone number.
C) call anyone with a cellular telephone number.
D) all of these.
174) What is a benefit of VoIP?
A) lowers costs
B) clear connection
C) higher expenses
D) all of these
175) What distributes digital video content using IP across the Internet and private IP networks?
A) Internet broadband policy network
B) Internet protocol TV (IPTV)
C) Internet Television Interactivity (ITVI)
D) Internet television personalization
176) What is a feature of IPTV?
A) IPTV uses low bandwidth.
B) IPTV offers personalization.
C) IPTV supports multiple devices.
D) all of these
177) What is software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons?
A) proxy
B) broadband over power line
C) attenuation
D) repeater
178) What technology makes possible high-speed Internet access over ordinary residential electrical lines and offers an alternative to DSL or high-speed cable modems?
A) proxy
B) broadband over power line
C) attenuation
D) repeater
179) What represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or radio interference or physical obstructions like walls also impact communication signals?
A) proxy
B) broadband over power line
C) attenuation
D) repeater
180) What receives and repeats a signal extending its attenuation or range?
A) proxy
B) broadband over power line
C) attenuation
D) repeater
181) What allows users to work from remote locations such as home or hotel using high-speed Internet to access business applications and data?
A) telecommuting
B) repeater
C) packet header
D) virtual attenuation
182) What is a single unit of binary data routed through a network?
A) packet
B) traceroute packet
C) packet header
D) packet footer
183) Which formats include a packet header, packet body containing the original message, and packet footer?
A) attenuation
B) standard packet
C) packet header
D) packet footer
184) What lists the destination (for example in IP packets the destination is the IP address) along with the length of the message data?
A) traceroute
B) standard packet
C) packet header
D) packet footer
185) What represents the end of the packet or transmission end?
A) traceroute
B) standard packet
C) packet header
D) packet footer
186) What is a utility application that monitors the network path of packet data sent to a remote computer?
A) traceroute
B) standard packet
C) packet header
D) packet footer
187) What represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or because of radio interference or physical obstructions such as walls.
A) traceroute
B) attenuation
C) repeater
D) packet footer
188) What is traceroute?
A) a single unit of binary data routed through a network
B) lists the destination (for example, in IP packets the destination is the IP address) along with the length of the message data
C) represents the end of the packet or transmission end
D) a utility application that monitors the network path of packet data sent to a remote computer
189) What is a packet?
A) a single unit of binary data routed through a network
B) lists the destination (for example, in IP packets the destination is the IP address) along with the length of the message data
C) represents the end of the packet or transmission end
D) a utility application that monitors the network path of packet data sent to a remote computer
190) What is a packet header?
A) a single unit of binary data routed through a network
B) lists the destination (for example, in IP packets the destination is the IP address) along with the length of the message data
C) represents the end of the packet or transmission end
D) a utility application that monitors the network path of packet data sent to a remote computer
191) What is a packet footer?
A) a single unit of binary data routed through a network
B) lists the destination (for example, in IP packets the destination is the IP address) along with the length of the message data
C) represents the end of the packet or transmission end
D) a utility application that monitors the network path of packet data sent to a remote computer
192) What are standard packet formats?
A) include a packet header, packet body containing the original message, and packet footer
B) lists the destination (for example, in IP packets the destination is the IP address) along with the length of the message data
C) represents the end of the packet or transmission end
D) a utility application that monitors the network path of packet data sent to a remote computer
193) What is a proxy?
A) software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons
B) a standard that specifies the format of data as well as the rules to be followed during transmission
C) a simple network protocol that allows the transfer of files between two computers on the Internet
D) a standard Internet protocol that provides the technical foundation for the public Internet as well as for large numbers of private networks
194) What is a protocol?
A) software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons
B) a standard that specifies the format of data as well as the rules to be followed during transmission
C) a simple network protocol that allows the transfer of files between two computers on the Internet
D) a standard Internet protocol that provides the technical foundation for the public Internet as well as for large numbers of private networks
195) What is a File Transfer Protocol (FTP)?
A) software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons
B) a standard that specifies the format of data as well as the rules to be followed during transmission
C) a simple network protocol that allows the transfer of files between two computers on the Internet
D) a standard Internet protocol that provides the technical foundation for the public Internet as well as for large numbers of private networks
196) What is Transmission Control Protocol/Internet Protocol (TCP/IP)?
A) software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons
B) a standard that specifies the format of data as well as the rules to be followed during transmission
C) a simple network protocol that allows the transfer of files between two computers on the Internet
D) a standard Internet protocol that provides the technical foundation for the public Internet as well as for large numbers of private networks
197) What is Dynamic Host Configuration Protocol (DHCP)?
A) allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network
B) converts IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions
C) the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures
D) the integration of communication channels into a single service
198) What is domain name system (DNS)?
A) allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network
B) converts IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions
C) the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures
D) the integration of communication channels into a single service
199) What is network convergence?
A) allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network
B) converts IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions
C) the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures
D) the integration of communication channels into a single service
200) What is unified communications (UC)?
A) allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network
B) converts IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions
C) the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures
D) the integration of communication channels into a single service
201) What is voice over IP (VoIP)?
A) uses IP technology to transmit telephone calls
B) a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server
C) distributes digital video content using IP across the Internet and private IP networks
D) the integration of communication channels into a single service
202) What is peer-to-peer (P2P)?
A) uses IP technology to transmit telephone calls
B) a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server
C) distributes digital video content using IP across the Internet and private IP networks
D) the integration of communication channels into a single service
203) What is Internet Protocol TV (IPTV)?
A) uses IP technology to transmit telephone calls
B) a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server
C) distributes digital video content using IP across the Internet and private IP networks
D) the integration of communication channels into a single service
204) What is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, and web publishing?
A) national ISP
B) regional ISP
C) intranet
D) extranet
205) What is an extension of an Intranet that is available only to authorized outsiders?
A) national ISP
B) regional ISP
C) intranet
D) extranet
206) An extranet is not available for use by a(n)
A) customer.
B) supplier.
C) employee.
D) competitor.
207) What is a VPN?
A) a direct network provider using a company server
B) a direct private network that creates a "private tunnel" within the Internet to connect to the corporate server
C) a direct URL that creates a private tunnel for a company
D) a direct P2P that creates an open access community for a company
208) Why would a company use an intranet?
A) Intranets are used for business operations and management.
B) Intranets are used for communications and collaboration.
C) Intranets are used for Web publishing.
D) All of these.
209) What is the major challenge of networking or performing business in a connected world?
A) personal issues
B) society demands
C) security issues
D) telecommuting demands
210) What are the two main methods for encrypting network traffic on the Web?
A) SSL and HTTP
B) SSL and SHTTP
C) DSL and HTTP
D) HTML and SHTTP
211) What is a combination of HTTP and SSL that provides encryption and secure identification of an Internet server?
A) secure hypertext transfer protocol (SHTTP)
B) secure sockets layer (SSL)
C) SSL certificate
D) SHTTP certificate
212) To create an SSL connection, a Web server requires a(n) ________, which is an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company.
A) DSL Degree
B) SSL Degree
C) SSL Certificate
D) DSL Certificate
213) What is the digital divide?
A) a worldwide gap giving advantage to those with access to technology
B) a data interruption in the Internet connection
C) a deficiency in school-aged children with computer knowledge
D) a divide between the economies of third world countries
214) What is the worldwide gap giving advantage to those with access to technology?
A) digital subscriber
B) digital divide
C) digital Darwinism
D) digital era
215) What are the four wireless communication network categories?
A) private servers, company servers, government servers, and international servers
B) protocol, land lines, rates, and worldwide
C) personal, local, regional, and international
D) personal area networks, wireless local area networks, wireless metropolitan area networks, and wireless wide area networks
216) Which of the following is not a type of wireless network?
A) PAN
B) WLAN
C) WWAN
D) MAN
217) Which of the below statements is not accurate in reference to mobile and wireless computing?
A) Mobile technology can travel with the user.
B) Wireless technology is any type of operation accomplished without the use of a hard-wired connection.
C) Wireless technology is any type of operation accomplished with the use of a hard-wired connection.
D) Mobile technology allows a user to download software to a laptop or cell phone for portable reading or reference.
218) What is a wireless network that provides communication over a short distance that is intended for use with devices that are owned and operated by a single user?
A) professional area network
B) personal area service
C) personal area network
D) political area network
219) What is a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices?
A) laptop
B) PDA
C) Bluetooth
D) camera
220) Which network uses radio signals to transmit and receive data over distances of a few hundred feet?
A) WMAN
B) WWAN
C) PAN
D) WLAN
221) What is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves?
A) Bluetooth
B) wireless fidelity (WI-FI)
C) wide area network (WAN)
D) wireless data centers
222) What are areas around access points where users can connect to the Internet via WI-FI?
A) hotspots
B) café or coffee shop
C) company break rooms
D) warmspots
223) The bandwidths associated with Wi-Fi are separated according to several wireless networking standards, known as ________, for carrying out wireless local area network communication.
A) bits
B) 802.11
C) 80118091
D) 91210
224) A wireless MAN (WMAN) is a metropolitan area network that uses ________ to transmit and receive data?
A) WI-FI ideas
B) STP technology
C) cable connections
D) radio signals
225) What is WiMAX?
A) Worldwide Interoperability for Microwave Access
B) World Interconnected through Mobile Awareness
C) World Interorganizations for Mobile Access
D) Wide International for Misinformation Access
226) A wireless WAN (WWAN) is a wide area network that uses radio signals to transmit and receive data and can be divided into which two categories?
A) cellular communications and multiple user communication systems
B) mobile and wireless technologies
C) cellular and satellite communication systems
D) client and server systems
227) Cell phones have morphed into ________ that offer more advanced computing ability and connectivity than basic cell phones.
A) micro computers
B) smart phones
C) streaming phones
D) super computers
228) What is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred?
A) streaming
B) streamlining
C) networking
D) wireless
229) What is a space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area?
A) GPS
B) satellite
C) GIS
D) LBS
230) Why do we use satellite communications?
A) cell phones
B) mobile base stations
C) satellite dish receivers
D) all of these
231) What is mobile?
A) means the technology can travel with the user; for instance, users can download software, email messages, and web pages onto a laptop or other mobile device
B) refers to any type of operation accomplished without the use of a hard-wired connection
C) a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices
D) provides communication for devices owned by a single user that work over a short distance
232) What is wireless?
A) means the technology can travel with the user; for instance, users can download software, email messages, and web pages onto a laptop or other mobile device
B) refers to any type of operation accomplished without the use of a hard-wired connection
C) a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices
D) provides communication for devices owned by a single user that work over a short distance
233) What is Bluetooth?
A) means the technology can travel with the user; for instance, users can download software, email messages, and web pages onto a laptop or other mobile device
B) refers to any type of operation accomplished without the use of a hard-wired connection
C) a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices
D) provides communication for devices owned by a single user that work over a short distance
234) What is a personal area network (PAN)?
A) means the technology can travel with the user; for instance, users can download software, email messages, and web pages onto a laptop or other mobile device
B) refers to any type of operation accomplished without the use of a hard-wired connection
C) a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices
D) provides communication for devices owned by a single user that work over a short distance
235) What is an access point (AP)?
A) the computer or network device that serves as an interface between devices and the network
B) refers to any type of operation accomplished without the use of a hard-wired connection
C) a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices
D) provides communication for devices owned by a single user that work over a short distance
236) What is a wireless MAN?
A) a metropolitan area network that uses radio signals to transmit and receive data
B) a communications technology aimed at providing high-speed wireless data over metropolitan area networks
C) a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves
D) includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a Wi-Fi signal
237) What is worldwide interoperability for microwave access (WiMAX)?
A) a metropolitan area network that uses radio signals to transmit and receive data
B) a communications technology aimed at providing high-speed wireless data over metropolitan area networks
C) a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves
D) includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a Wi-Fi signal
238) What is wireless fidelity (Wi-Fi)?
A) a metropolitan area network that uses radio signals to transmit and receive data
B) a communications technology aimed at providing high-speed wireless data over metropolitan area networks
C) a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves
D) includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a Wi-Fi signal
239) What is Wi-Fi infrastructure?
A) a metropolitan area network that uses radio signals to transmit and receive data
B) a communications technology aimed at providing high-speed wireless data over metropolitan area networks
C) a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves
D) includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a Wi-Fi signal
240) What is wired equivalent privacy (WEP)?
A) a metropolitan area network that uses radio signals to transmit and receive data
B) a communications technology aimed at providing high-speed wireless data over metropolitan area networks
C) a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves
D) an encryption algorithm designed to protect wireless transmission data
241) What is Wi-Fi protected access (WPA)?
A) a metropolitan area network that uses radio signals to transmit and receive data
B) a communications technology aimed at providing high-speed wireless data over metropolitan area networks
C) a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves
D) a wireless security protocol to protect Wi-Fi networks
242) What is voice over LTE (VoLTE)?
A) allows mobile voice calls to be made over broadband networks, creating—under the right network conditions—clearer audio and fewer dropped calls
B) the practice of tagging pavement with codes displaying where Wi-Fi access is available
C) deliberately searching for Wi-Fi signals while driving by in a vehicle
D) remotely controls smart phones and tablets, ensuring data security
243) What is war chalking?
A) allows mobile voice calls to be made over broadband networks, creating—under the right network conditions—clearer audio and fewer dropped calls
B) the practice of tagging pavement with codes displaying where Wi-Fi access is available
C) deliberately searching for Wi-Fi signals while driving by in a vehicle
D) remotely controls smart phones and tablets, ensuring data security
244) What is war driving?
A) allows mobile voice calls to be made over broadband networks, creating—under the right network conditions—clearer audio and fewer dropped calls
B) the practice of tagging pavement with codes displaying where Wi-Fi access is available
C) deliberately searching for Wi-Fi signals while driving by in a vehicle
D) remotely controls smart phones and tablets, ensuring data security
245) What is IT consumerization?
A) allows mobile voice calls to be made over broadband networks, creating—under the right network conditions—clearer audio and fewer dropped calls
B) remotely controls smart phones and tablets, ensuring data security
C) deliberately searching for Wi-Fi signals while driving by in a vehicle
D) the blending of personal and business use of technology devices and applications
246) What is mobile device management (MDM)?
A) allows mobile voice calls to be made over broadband networks, creating—under the right network conditions—clearer audio and fewer dropped calls
B) remotely controls smart phones and tablets, ensuring data security
C) the blending of personal and business use of technology devices and applications
D) administers and delivers applications to corporate and personal smart phones and tablets
247) What is mobile application management (MAM)?
A) the blending of personal and business use of technology devices and applications
B) remotely controls smart phones and tablets, ensuring data security
C) allows mobile voice calls to be made over broadband networks, creating—under the right network conditions—clearer audio and fewer dropped calls
D) administers and delivers applications to corporate and personal smart phones and tablets
248) Which of the below is experiencing rapid growth due to wireless technology?
A) RFID
B) GPS
C) GIS
D) all of these.
249) Which business application uses electronic tags and labels to identify objects wirelessly over short distances?
A) radio-frequency identification
B) global positioning systems
C) geographic information systems
D) location-based services
250) Which business application uses location information to provide a service and is designed to give mobile users instant access to personalized local content?
A) radio-frequency identification
B) global positioning systems
C) geographic information systems
D) location-based services
251) Which business application is a satellite-based navigation system providing extremely accurate position, time, and speed information?
A) radio-frequency identification
B) global positioning systems
C) geographic information systems
D) location-based services
252) Which business application consists of hardware, software, and data that provide location information for display on a multidimensional map?
A) radio-frequency identification
B) global positioning systems
C) geographic information systems
D) location-based services
253) Which of the following is not a primary use of GIS?
A) finding what is nearby from a specific location
B) mapping densities
C) routing information
D) ensuring safety equipment is on an airplane before a flight
254) Which of the below uses both GIS and GPS?
A) navigation
B) wireless advertising
C) vehicle location
D) all of these
255) Which social media site uses LBS?
A) Foursquare
B) iTunes
C) Google
D) YouTube
256) Which tags have their own transmitter and a power source (typically a battery)?
A) active RFID
B) semi-passive RFID
C) RFID accelerometer
D) chipless RFID
257) Which tags use a battery to run the microchip's circuitry, but communicate by drawing power from the RFID reader?
A) active RFID
B) semi-passive RFID
C) RFID accelerometer
D) chipless RFID
258) What occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items location with little or no manual intervention?
A) active RFID
B) semi-passive RFID
C) RFID accelerometer
D) asset tracking
259) What is a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds?
A) active RFID
B) semi-passive RFID
C) RFID accelerometer
D) chipless RFID
260) Which tags do not depend on a silicon microchip and use plastic or conductive polymers instead of silicon-based microchips allowing them to be washed or exposed to water without damaging the chip?
A) active RFID
B) semi-passive RFID
C) RFID accelerometer
D) chipless RFID
261) What is an RFID tag device made up of?
A) chip, antenna
B) chip, reader
C) battery, reader
D) battery, antenna
262) What uses GPS tracking to track vehicles?
A) automatic vehicle location
B) geographic information system
C) cartography
D) edge matching
263) What stores, views, and analyzes geographic data creating multidimensional charts or maps?
A) automatic vehicle location
B) geographic information system
C) cartography
D) edge matching
264) What is the science and art of making an illustrated map or chart?
A) automatic vehicle location
B) geographic information system
C) cartography
D) edge matching
265) What occurs when paper maps are laid edge-to-edge and items that run across maps do not match are reconfigured to match?
A) automatic vehicle location
B) geographic information system
C) cartography
D) edge matching
266) What identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more?
A) automatic vehicle location
B) geographic information system
C) cartography
D) spatial data
267) What is a coding process that takes a digital map feature and assigns it an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category)?
A) geocoding
B) geocache
C) geocoin
D) all of these
268) Who are certified in geocoding practices to ensure industry standards are met when classifying spatial data?
A) GIS professionals
B) enterprise architects
C) database engineers
D) all of these
269) What is a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find?
A) geocoding
B) geocache
C) geocoin
D) all of these
270) What is a round coin-sized object uniquely numbered and hidden in geocache?
A) geocoding
B) geocache
C) geocoin
D) all of these
271) What is the time of day of an expected arrival at a certain destination and is typically used for navigation applications?
A) estimated-time-of-arrival
B) estimated-time-enroute
C) latitude
D) longitude
272) What is the time remaining before reaching a destination using the present speed and is typically used for navigation applications?
A) estimated-time-of-arrival
B) estimated-time-enroute
C) latitude
D) longitude
273) What represents a north/south measurement of position?
A) estimated-time-of-arrival
B) estimated-time-enroute
C) latitude
D) longitude
274) What represents an east/west measurement of position?
A) estimated-time-of-arrival
B) estimated-time-enroute
C) latitude
D) longitude
275) What is an RFID tag?
A) an electronic identification device that is made up of a chip and antenna
B) a transmitter/receiver that reads the contents of RFID tags in the area
C) do not have a power source
D) have their own transmitter and a power source (typically a battery)
276) What is an RFID reader (RFID interrogator)?
A) an electronic identification device that is made up of a chip and antenna
B) a transmitter/receiver that reads the contents of RFID tags in the area
C) do not have a power source
D) have their own transmitter and a power source (typically a battery)
277) What is a passive RFID tags?
A) an electronic identification device that is made up of a chip and antenna
B) a transmitter/receiver that reads the contents of RFID tags in the area
C) do not have a power source
D) have their own transmitter and a power source (typically a battery)
278) What is an active RFID tag?
A) an electronic identification device that is made up of a chip and antenna
B) a transmitter/receiver that reads the contents of RFID tags in the area
C) do not have a power source
D) have their own transmitter and a power source (typically a battery)
279) What is a semi-passive RFID tag?
A) an electronic identification device that is made up of a chip and antenna
B) a transmitter/receiver that reads the contents of RFID tags in the area
C) do not have a power source
D) uses a battery to run the microchip's circuitry but communicate by drawing power from the RFID reader
280) What is asset tracking?
A) occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention
B) use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip
C) a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds
D) a satellite-based navigation system providing extremely accurate position, time, and speed
281) What is an RFID accelerometer?
A) occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention
B) use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip
C) a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds
D) a satellite-based navigation system providing extremely accurate position, time, and speed
282) What is a chipless RFID tag?
A) occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention
B) use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip
C) a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds
D) a satellite-based navigation system providing extremely accurate position, time, and speed information
283) What is a global positioning system (GPS)?
A) occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention
B) use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip
C) a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds
D) a satellite-based navigation system providing extremely accurate position, time, and speed information
284) What is automatic vehicle location (AVL)?
A) uses GPS tracking to track vehicles
B) use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip
C) a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds
D) a satellite-based navigation system providing extremely accurate position, time, and speed information
285) What is latitude?
A) use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip
B) a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds
C) a satellite-based navigation system providing extremely accurate position, time, and speed information
D) a north/south measurement of position
286) What is longitude?
A) use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip
B) a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds
C) a satellite-based navigation system providing extremely accurate position, time, and speed information
D) an east/west measurement of position
287) What is geocache?
A) a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds
B) a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find
C) a north/south measurement of position
D) an east/west measurement of position
288) What is a geocoin?
A) a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds
B) an east/west measurement of position
C) a north/south measurement of position
D) a round coin-sized object uniquely numbered and hidden in geocache
289) What is estimated-time-of-arrival (ETA)?
A) a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds
B) a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find
C) a north/south measurement of position
D) the time of day of an expected arrival at a certain destination and is typically used for navigation applications
290) What is estimated-time-of-enroute (ETE)?
A) the time remaining before reaching a destination using the present speed and is typically used for navigation applications
B) the time of day of an expected arrival at a certain destination and is typically used for navigation applications
C) a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds
D) a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find
291) What is a geographic information system (GIS)?
A) a north/south measurement of position
B) an east/west measurement of position
C) stores, views, and analyzes geographic data, creating multidimensional charts or maps
D) a round coin-sized object uniquely numbered and hidden in geocache
292) What is cartography?
A) an east/west measurement of position
B) the science and art of making an illustrated map or chart
C) stores, views, and analyzes geographic data, creating multidimensional charts or maps
D) a round coin-sized object uniquely numbered and hidden in geocache
293) What is a GIS map?
A) links business assets to a centralized system where they can be tracked and monitored over time
B) identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more
C) stores, views, and analyzes geographic data, creating multidimensional charts or maps
D) a round coin-sized object uniquely numbered and hidden in geocache
294) What is spatial data?
A) identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more
B) links business assets to a centralized system where they can be tracked and monitored over time
C) stores, views, and analyzes geographic data, creating multidimensional charts or maps
D) a round coin-sized object uniquely numbered and hidden in geocache
295) What is geocoding?
A) identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more
B) links business assets to a centralized system where they can be tracked and monitored over time
C) in spatial databases is a coding process that assigns a digital map feature to an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category)
D) a round coin-sized object uniquely numbered and hidden in geocache
296) What do both GPS and GIS use?
A) identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more
B) links business assets to a centralized system where they can be tracked and monitored over time
C) in spatial databases is a coding process that assigns a digital map feature to an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category)
D) location-based services (LBS) applications that use location information to provide a service
297) Explain the five different networking elements creating a connected world.
298) Identify the benefits of a connected world.
299) Identify the challenges of a connected world.
300) Explain the different wireless network categories.
301) Explain the different wireless network business applications.
302) Identify the benefits of business mobility.
303) Identify the challenges of business mobility.
Document Information
Connected Book
M Information Systems 5th Edition | Test Bank with Answer Key by Paige Baltzan
By Paige Baltzan