Exam 16: A Managers Guide to the Internet and Telecommunications

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Peering usually takes place at neutral sites called _____.

(Multiple Choice)
4.8/5
(37)

IP addresses can oftentimes be used to identify a user's geographic location.

(True/False)
4.7/5
(42)

Mobile providers can be susceptible to poor coverage indoors as a result of:

(Multiple Choice)
4.8/5
(37)

Briefly describe how the DNS helps users communicate with each other.

(Essay)
4.9/5
(40)

The address one types into a Web browser is also known as a:

(Multiple Choice)
5.0/5
(31)

Popular sites like Google and Yahoo! have several computers assigned to their host names because:

(Multiple Choice)
4.8/5
(39)

Which of the following applications is most likely to use UDP instead of TCP?

(Multiple Choice)
4.8/5
(35)

_____ is the insulated copper cable commonly used by cable television providers with shielding to reduce electrical interference.

(Multiple Choice)
4.8/5
(35)

Dot-com domain name registration is carried out on an auction basis to ensure the highest bidder gains rights to the desired domain name.

(True/False)
4.8/5
(36)

Supporters of net neutrality believe:

(Multiple Choice)
4.9/5
(35)

_____ involves allowing voice packets to gain delivery importance over packets for applications like e-mail.

(Multiple Choice)
4.9/5
(40)

Verizon and Sprint have already begun testing services that are _____ times faster than most 4G available in the United States.

(Multiple Choice)
4.8/5
(40)

One of the functions of the IP is to:

(Multiple Choice)
4.8/5
(40)

The most dominant standard for 4G technology worldwide is

(Multiple Choice)
4.7/5
(41)

Servers or organizations do not need to be housed within a country in order to use a country code as part of their domain name.

(True/False)
4.9/5
(28)

Peering refers to:

(Multiple Choice)
4.9/5
(36)

Which of the following statements holds true for the term "html"?

(Multiple Choice)
4.9/5
(28)

Describe the process involving the transmission of a Web page from a Web server to a user's computer.

(Essay)
4.7/5
(33)

_____ is the nonprofit organization responsible for managing the Internet's domain and numbering systems.

(Essay)
4.8/5
(34)

The exploit referred to as __________ allowed hackers to leverage vulnerability in DNS software to redirect users to sites they did not request.

(Multiple Choice)
4.7/5
(36)
Showing 21 - 40 of 81
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)