Exam 7: Networks: Mobile Business: Module 3: Enterprise MIS

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The network access technologies include DSL, cable modem, and broadband.

(True/False)
4.8/5
(35)

GIS map automation links business assets to a centralized system where they can be tracked and monitored over time.

(True/False)
4.8/5
(37)

A proxy is software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons.

(True/False)
4.8/5
(36)

Hotspots are designated locations where Wi-Fi access points are publicly available.

(True/False)
4.8/5
(38)

What uses GPS tracking to track vehicles?

(Multiple Choice)
4.9/5
(37)

What is an access point (AP)?

(Multiple Choice)
4.9/5
(37)

Wired equivalent privacy (WEP) is an encryption algorithm designed to protect wireless transmission data.

(True/False)
4.7/5
(39)

What are the five elements that are needed to create a connected world or a network?

(Multiple Choice)
4.9/5
(37)

Which tags have their own transmitter and a power source (typically a battery)?

(Multiple Choice)
4.8/5
(40)

Dynamic host configuration protocol is a utility application that monitors the network path of packet data sent to a remote computer.

(True/False)
4.8/5
(32)

Attenuation is a single unit of binary data routed through a network.

(True/False)
4.7/5
(37)

An extranet is not available for use by a ________.

(Multiple Choice)
4.9/5
(47)

Estimated time of arrival (ETA) is the time of day of an expected arrival at a certain destination and is typically used for navigation applications.

(True/False)
4.9/5
(32)

VPNs are often used to connect to a corporate server.VPN stands for a Valued Partner Network.

(True/False)
4.7/5
(35)

An intranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, web publishing, and the support of business processes.

(True/False)
4.7/5
(42)

What is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server?

(Multiple Choice)
4.8/5
(37)

Which of the choices below offers an example of a WAN?

(Multiple Choice)
4.7/5
(30)

A geocoin, a round coin-sized object, is uniquely numbered and hidden in geocache.Geocoins can also be shaped to match a theme like the state of Colorado or a birthday party hat.Geocoins are often decorative or commemorative, making them collectible and highly valuable for technology adventures.

(True/False)
4.7/5
(35)

What spans a large geographic area such as a state, province, or country, similar to the Internet?

(Multiple Choice)
4.8/5
(35)

What is the major challenge of networking or performing business in a connected world?

(Multiple Choice)
4.9/5
(38)
Showing 81 - 100 of 303
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)