Exam 6: Data Communications
Exam 1: The Importance of Mis124 Questions
Exam 2: Collaboration Information Systems120 Questions
Exam 3: Information Systems for Competitive Advantage101 Questions
Exam 4: Hardware and Software126 Questions
Exam 5: Database Processing138 Questions
Exam 6: Data Communications132 Questions
Exam 7: How the Internet Works58 Questions
Exam 8: Business Process Management153 Questions
Exam 9: E-Commerce and Web 2.0120 Questions
Exam 10: Business Intelligence Systems131 Questions
Exam 11: Managing Development128 Questions
Exam 12: Information Systems Management120 Questions
Exam 13: Information Security Management137 Questions
Exam 14: International Dimension 1 - the Global Economy19 Questions
Exam 15: International Dimension 2 - Global Communication19 Questions
Exam 16: International Dimension 3 - Global Is and the Value Chain19 Questions
Exam 17: International Dimension 4 - International It Management and Development19 Questions
Select questions type
Broadband communications have transmission speeds in excess of ________.
Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
A
Which is a special version of asymmetric encryption that is popular on the Internet?
Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
A
List the functions of an ISP.
Free
(Essay)
4.9/5
(33)
Correct Answer:
An ISP has three important functions.First,it provides you with a legitimate Internet address.Second,it serves as your gateway to the Internet.The ISP receives the communications from your computer and passes them on to the Internet,and it receives communications from the Internet and passes them on to you.Finally,ISPs pay for the Internet.They collect money from their customers and pay access fees and other charges on your behalf.
_____ are special purpose computers that move network traffic between nodes.
(Multiple Choice)
4.8/5
(33)
Leased lines may be a good option if there is a large amount of traffic between a small number of locations.
(True/False)
4.9/5
(31)
A ________ must be used to convert an analog signal to a digital one,when trying to transmit data over a typical phone line.
(Multiple Choice)
4.8/5
(42)
A(n)________ is a computing device that prevents unauthorized network access.
(Multiple Choice)
4.9/5
(38)
There is one standard protocol,EVDO,which is used by all of the wireless providers for WAN connections.
(True/False)
4.8/5
(44)
To provide seamless flow to networks that comprise an Internet an elaborate scheme called a(n)________ is used.
(Multiple Choice)
4.9/5
(34)
A(n)________ uses the Internet or other internet to create the appearance of private,point-to-point connections.
(Multiple Choice)
4.7/5
(27)
One disadvantage of using VPN is that customers cannot use the VPN from their own sites.
(True/False)
4.7/5
(33)
In most cases,the speed of cable modems and DSL modems is about the same.
(True/False)
4.9/5
(37)
Whether it is a DSL line,a cable TV line,or a wireless satellite connection,all of them require a modem.
(True/False)
4.9/5
(30)
Optical fiber cables are wrapped in a cladding to contain the light signals.
(True/False)
4.7/5
(39)
Which of the following WAN protocols has the greatest potential for speed?
(Multiple Choice)
4.7/5
(32)
Showing 1 - 20 of 132
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)