Exam 16: A Managers Guide to the Internet and Telecommunications
Exam 1: Setting the Stage: Technology and the Modern Enterprise59 Questions
Exam 2: Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners From Losers78 Questions
Exam 3: Zara: Fast Fashion From Savvy Systems70 Questions
Exam 4: Netflix in Two Acts: the Making of an E-Commerce Giant and the Uncertain Future of Atoms to Bits94 Questions
Exam 5: Moores Law and More: Fast, Cheap Computing and What This Means for the Manager78 Questions
Exam 6: Disruptive Technologies: Understanding the Giant Killers and Considerations for Avoiding Extinction38 Questions
Exam 7: Amazoncom: an Empire Stretching From Cardboard Box to Kindle to Cloud93 Questions
Exam 8: Understanding Network Effects: Strategies for Competing in a Platform-Centric, Winner-Take-All World71 Questions
Exam 9: Social Media, Peer Production, and Web 20111 Questions
Exam 10: The Sharing Economy, Collaborative Consumption, and Creating More Efficient Markets Through Technology43 Questions
Exam 11: Facebook: a Billion-Plus Users, the High-Stakes Move to Mobile, and Big Business From the Social Graph103 Questions
Exam 12: Rent the Runway: Entrepreneurs Expanding an Industry52 Questions
Exam 13: Understanding Software: a Primer for Managers75 Questions
Exam 14: Software in Flux: Open Source, Cloud, Vittualized and App-Driven Shifts84 Questions
Exam 15: The Data Asset: Databases, Business Intelligence, Analytics, Big Data, and Competitive Advantage97 Questions
Exam 16: A Managers Guide to the Internet and Telecommunications82 Questions
Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else89 Questions
Exam 18: Google in Three Parts: Search, Online Advertising, and an Alphabet of Opportunity137 Questions
Select questions type
_____ involves allowing voice packets to gain delivery importance over packets for applications like e-mail.
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
E
_____ refers to the application transfer protocol that is used to copy files from one computer to another.
Free
(Short Answer)
4.9/5
(37)
Correct Answer:
File transfer protocol
_____ is the principle that all Internet traffic should be treated equally.
Free
(Short Answer)
4.8/5
(36)
Correct Answer:
Net neutrality
Computer programs making decisions without any human intervention conduct most U.S. stock trading.
(True/False)
4.8/5
(43)
Mobile providers can be susceptible to poor coverage indoors as a result of:
(Multiple Choice)
4.9/5
(43)
Internet services that run at download speeds of a minimum of 25 mbps and upload speeds of three mbps are called ____________.
(Short Answer)
4.9/5
(37)
The hypertext transfer protocol (http) defines the communication between:
(Multiple Choice)
5.0/5
(33)
The frequencies licensed by telecommunication firms to provide wireless service is known as _____.
(Multiple Choice)
4.9/5
(33)
A(n) _____ is a computing device that connects networks and exchanges data between them.
(Short Answer)
4.7/5
(38)
A _____ enables communication by defining the format of data and rules for exchange.
(Multiple Choice)
4.8/5
(40)
When the Internet really took off, much of the Internet's operating infrastructure transitioned to be supported by government grants rather than private firms.
(True/False)
4.7/5
(40)
The User Datagram Protocol (UDP) acts as a substitute to TCP when there is a need for speed of communication, but where perfect and complete transmission quality can be sacrificed.
(True/False)
4.7/5
(29)
A(n) _____ is a temporary storage space used to speed computing tasks.
(Multiple Choice)
4.9/5
(33)
Showing 1 - 20 of 82
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)