Exam 4: Networks, Collaborative Technology, and the Internet of Things
Exam 1: Disruptive IT Impacts Companies, competition, and Careers96 Questions
Exam 2: Information Systems, IT Architecture, Data Governance, and Cloud Computing168 Questions
Exam 3: Data Management, Business Intelligence, and Data Analytics123 Questions
Exam 4: Networks, Collaborative Technology, and the Internet of Things135 Questions
Exam 5: Cybersecurity and Risk Management Technology148 Questions
Exam 6: Search, Semantic, and Recommendation Technology122 Questions
Exam 7: Web 2.0 and Social Technology111 Questions
Exam 8: Retail, e-Commerce, and Mobile Commerce Technology145 Questions
Exam 9: Functional Business Systems151 Questions
Exam 10: Enterprise Systems124 Questions
Exam 11: Data Visualization and Geographic Information Systems92 Questions
Exam 12: IT Strategy, Sourcing, and Strategic Technology Trends130 Questions
Exam 13: Systems Development and Project Management112 Questions
Exam 14: IT Ethics, Privacy and Sustainability66 Questions
Select questions type
Wal-Mart provides P&G access to sales information on every item Wal-Mart buys from P&G.The information is collected by P&G on a daily basis from every Wal-Mart store,and P&G uses the information to manage the inventory replenishment for Wal-Mart.This is an example of:
(Multiple Choice)
4.7/5
(34)
Network ________ are devices that transmit ________from their source to their destination based on IP addresses.
(Multiple Choice)
4.9/5
(37)
When Julie Smith wants to find information on the Internet,she uses the Google search engine.But when she wants to find a document or data set created by her company for internal purposes only,she logs into the company ________.
(Multiple Choice)
5.0/5
(27)
To reduce product development time,Caterpillar connected its engineering and manufacturing divisions with its active suppliers,distributors,overseas factories,and customers,through ________.
(Multiple Choice)
4.9/5
(30)
Network __________ is measured in terms of its throughput,or bandwidth
(Short Answer)
4.9/5
(28)
Files are broken down into blocks known as protocols in order to be transmitted over a network to their destination.
(True/False)
4.8/5
(27)
Bandwidth depends on the network _____________,which are the rules and standards that govern how devices on a network exchange data and talk to each other.
(Short Answer)
4.8/5
(33)
Extranets are used within a company for data access,sharing,and collaboration.They are portals or gateways that provide easy and inexpensive browsing and search capabilities.
(True/False)
4.7/5
(35)
A router acts as a controller,enabling networked devices to talk to each other efficiently.
(True/False)
4.8/5
(29)
In terms of network capacity,a pipeline analogy is often used.The larger the diameter of the pipe,the greater the throughput (volume)of water that flows through it and the faster water is being transferred through it.This analogy refers to a network's ___________.
(Multiple Choice)
4.7/5
(35)
Network traffic is shaped by delaying the flow of less important network traffic,such as bulk data transfers,P2P file-sharing programs,and BitTorrent traffic.
(True/False)
4.7/5
(34)
Yammer is an enterprise social network that helps employees collaborate across departments,locations,and business apps.
(True/False)
4.8/5
(34)
The City of Santander,Spain monitors many aspects of city life through the transmissions of _________ embedded throughout the city.
(Multiple Choice)
4.7/5
(31)
The two basic types of switching are circuit switching and __________ switching.
(Short Answer)
4.9/5
(37)
IPv6 addresses have 6 groups of alphanumeric characters,which allow for 2^106 addresses.
(True/False)
4.7/5
(35)
___________ is an umbrella term that applies to various location-aware technologies that allow devices to communicate securely with each other over short distances.It is used,for instance,to allow people to make purchases with their smartphones.
(Short Answer)
4.7/5
(34)
NFC are location-aware technologies that are less secure than other wireless technologies like Bluetooth and Wi-Fi.
(True/False)
4.9/5
(28)
IT developers use ________ to quickly and easily connect diverse data and services to each other and as gateways to popular apps such as Twitter,Facebook,and Amazon.
(Multiple Choice)
4.9/5
(39)
One strategy for regulating network use is to ___________ traffic which means data and apps that are time-delay sensitive are given priority on the network
(Short Answer)
4.8/5
(26)
How does a virtual private network (VPN)provide additional security over other types of networks?
(Multiple Choice)
4.8/5
(31)
Showing 101 - 120 of 135
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)