Deck 4: Networks, Collaborative Technology, and the Internet of Things

Full screen (f)
exit full mode
Question
In terms of digital transmissions,_______ transfers data in small blocks based on the destination IP address.

A)Chunking
B)Circuit switching
C)Packet switching
D)IP Streaming
Use Space or
up arrow
down arrow
to flip the card.
Question
Network capacity is measured in terms of its ________.

A)Protocol
B)Size
C)IP version
D)Bandwidth
Question
________ is the method by which data are sent from one device to another via a network.

A)API
B)5G
C)Bandwidth
D)IP
Question
Bandwidth-intensive apps are important to business processes,but they also strain network capabilities and resources.One strategy for regulating a network's quality or service is to "prioritize traffic" which means:

A)Allocating network resources to users based on seniority in the organization
B)Data and apps that are sensitive to time-delay are given priority on the network
C)Giving priority to mobile transmissions to avoid bottlenecks
D)Restricting traffic from voice and video apps that disproportionally use network bandwidth to times when demand for network resources is low
Question
Sony realized that the technical limitations of____ were making it urgent to move to ________.

A)64-bit addresses;128-bit version
B)IPv4addresses;IPv6
C)IP addresses;mobile networks
D)3G addresses;4Gor 5G networks
Question
Every device that communicates with a network must have a unique identifying ________

A)API
B)IP address
C)protocol
D)VoIP
Question
In terms of network capacity,a pipeline analogy is often used.The larger the diameter of the pipe,the greater the throughput (volume)of water that flows through it and the faster water is being transferred through it.This analogy refers to a network's ___________.

A)Packet router
B)Transmission protocols
C)Connectivity
D)Bandwidth
Question
Which of the following decides how the digital 1's and 0's are represented in terms of voltage and frequencies?

A)Signal frequency spectrum
B)Bandwidth
C)Switches and routers
D)Modulation and coding
Question
Network ________ are devices that transmit ________from their source to their destination based on IP addresses.

A)switches and routers: data packets
B)APIs;data packets
C)routers;digital signals
D)firewalls;digital signals
Question
With _________,voice and data transmissions travel in packets over telephone wires.

A)VoIP
B)MP3 or MP4
C)TCP/IP
D)Wi-Fi
Question
To insure QoS of a network,an alternative to "prioritizing traffic" is to __________,which means holding back traffic from non-time sensitive apps so that apps like voice and video run more effectively.

A)Throttle traffic
B)Block traffic
C)Re-direct traffic
D)Filter traffic
Question
Basic functions of business networks are all of the following except _______.

A)Search
B)Mobility
C)Collaboration
D)Routers
Question
Which of the following about IPv4 is false?

A)It has been Internet protocol for over three decades.
B)It is easy to configure and to change ISP.
C)It has reached the limits of its design.
D)It is being replaced with IPv6.
Question
_________ networks are high capacity digital networks.

A)Circuit
B)Narrowband
C)Broadband
D)Smart grid
Question
An important management decision concerns the network's _________ especially for delay-sensitive data such as real-time voice and high-quality video.

A)Size and Scope
B)Availability and number of access points
C)Mobility
D)Quality of service (QoS)
Question
Investments in data networks,IP addresses,routers,and switches are ________ because of their impact on productivity,security,user experiences,and customer service.

A)telecommunication basics
B)tactical issues
C)technology decisions
D)business decisions
Question
All generations of networks are based on ________.

A)switching
B)wireless
C)The cloud
D)circuits
Question
____________ is older technology for transmitting signals that originated with telephone calls;and is inefficient for digital transmission.

A)Chunking
B)Circuit switching
C)Packet switching
D)IP Streaming
Question
_____________ are the rules and standards that govern how devices on a network exchange data and talk to each other.

A)Security settings
B)Organization's IT policies
C)Network protocols
D)Traffic priority procedures
Question
Which of the following is not one of the basic functions of business networks?

A)Relationships
B)Strategic Planning
C)Search
D)Communication
Question
Enterprises are moving away from ad hoc adoption of mobile devices and network infrastructure to a more strategic planning build-out of their mobile capabilities.Factors to be considered when planning the build out include all of the following except ________.

A)Demands of multi-tasking mobile devices on the network
B)Impact of mobile technology on organizational culture
C)More robust mobile OSs
D)Mobile applications
Question
After Ford Motor Company began relying on UPS Logistics Group's data networks to track millions of cars and trucks and to analyze any potential problems before they occurred,Ford realized a ________ reduction in vehicle inventory.

A)$1 million
B)$5 million
C)$1 billion
D)$5 billion
Question
Cable or DSL Internet connections are referred to as __________ broadband.

A)Mobile
B)Fixed-line
C)3G mobile
D)4G mobile
Question
Which of the following represents the primary perspective of people who oppose Net Neutrality?

A)They are concerned about a growing risk to privacy and ability to transmit data securely over the Internet.
B)They argue that there have always been different levels of Internet service and that a two-tiered system would enable more freedom of choice and promote e-commerce.
C)They are concerned that the government is not doing enough to properly regulate the Internet.
D)They are concerned about the growth of traffic shaping because it has the potential to slow transmission of certain types of data or content.
Question
In most organizations today,when the network goes down,it causes ___________.

A)Little or no disruption
B)Minor disruption of productivity or service
C)Significant disruption of productivity or service
D)Almost complete disruption of productivity or service,including lost sales,financial consequences and inability to process payroll and inventory.
Question
Mobile infrastructure consists of the integration of all of the following factors except ________.

A)Devices
B)Support
C)Security measures
D)Personnel
Question
Which of the following statements represents the primary concerns of people who are in favor of Net Neutrality?

A)They fear that ISPs will be able to block content representing controversial points of view or that access to high speed Internet transmission will be restricted to content providers who can pay for faster transmission.
B)They are concerned that ISPs will become over-regulated by government agencies.
C)They are concerned that ISPs will lose the ability to properly fund network expansion to accommodate the growing need for bandwidth intensive services.
D)They are concerned about growing risks to privacy and the ability to transmit data securely over the Internet.
Question
Which of the following trends or transformations was not forecast in Cisco's most recent Visual Networking Index Forecast (VNI)?

A)Smartphones will reach 81% of mobile data traffic by 2020.
B)Number of mobile-connected devices will exceed the world's population.
C)A lot of traffic will be offloaded from cellular networks and onto public Wi-Fi networks.
D)80% of these new smartphone users will be located in Asia Pacific,the Middle East and Africa.
Question
Mobile networks and infrastructure have the potential to reduce healthcare costs.Tracking medical equipment and hospital inventory,such as gurneys,are done with _________ at a number of hospitals.

A)API
B)GPS
C)RFID tagging
D)Linux
Question
Networking standards "802.11b","802.11a",and "802.11g" are different types of _____________ standards.

A)MIMO
B)DSL
C)Wi-Fi
D)Bluetooth
Question
Which of the following is not true about the Net Neutrality debate?

A)ISPs need a financially sustainable way to pay for the costs of network expansion and upgrades so that the Internet can meet the growing needs of the people and organizations that use it.
B)A two-tiered system would make things more difficult for new,innovative businesses that lack the financial resources to pay for access to premium service levels.
C)The FCC's 2010 ruling allows ISPs to charge companies for faster data transmission - but does not allow ISPs to outright block content.
D)Almost all business organizations favor a two-tiered system whereas most individual users favor Net Neutrality.
Question
___________ is an umbrella term that applies to location-aware technologies that allow devices to communicate securely with each other over short distances.

A)GPS technology
B)Location sensitive apps
C)Geo-location technology
D)Near-field communications
Question
Which of the following is not a function of network protocols?

A)Send data to the correct recipient(s)
B)Physically transmit data
C)Determine encryption algorithm and convert message
D)Receive messages and send responses to the correct recipient
Question
___________ is the practice of managing data transfer to ensure a certain level of performance or QoS.

A)Data filtering
B)Packet filtering
C)Circuit switching
D)Traffic shaping
Question
The 4G networks are faster than 3G because 4G are all ____________ networks.

A)mobile
B)digital or IP
C)packet switched
D)wireless
Question
IT developers use ________ to quickly and easily connect diverse data and services to each other and as gateways to popular apps such as Twitter,Facebook,and Amazon.

A)Mobile OS
B)APIs
C)SQL
D)SlashDB
Question
Which of the following statements best represents the position of people who are in favor of Net Neutrality?

A)The Internet should be free for everyone.
B)ISPs should treat all sources of data equally and not give priority to content providers who pay for faster transmission.
C)Providers of VoIP,video or other bandwidth intensive services should pay more to ISPs to carry their content because they use a disproportionate amount of network resources.
D)Users of video or similar bandwidth intensive services should pay more to ISPs for this content because they use a disproportionate amount of network resources.
Question
_____________ is a location-aware system that transmits the identity (in the form of a unique serial number)of an object or person using radio waves.It is used to track items in a supply chain or equipment in a production facility.

A)RFID
B)GIS
C)LTE
D)GSM
Question
____________is the basic communication protocol of the Internet.This protocol is supported by every major network operating system (OS)to ensure that all devices on the Internet can communicate.

A)HTML
B)HTTP
C)TCP/IP
D)FTP
Question
Mobile device apps that enable users to pay for things or check-in to hotels or venues use _________ technology.

A)GPS
B)GIS
C)TCP/IP
D)NFC
Question
Which of these location-aware technologies is the most secure?

A)NFC
B)WiFi
C)Bluetooth
D)WiMAX
Question
Amazon has enhanced its voice-automated Alexa with a new standard API called __________which increases the efficiency of the list feature.

A)Personal Lister
B)Voice Activator
C)List Skills
D)Catalog Expander
Question
To reduce product development time,Caterpillar connected its engineering and manufacturing divisions with its active suppliers,distributors,overseas factories,and customers,through ________.

A)An extranet
B)An intranet
C)A Transportation Business Center
D)A third-party,value-added network
Question
In basic terms,the IoT means that you can connect any device that has a(n)______ to the Internet or to each other.

A)computer chip
B)RFID tag
C)wireless card
D)on/off switch
Question
Dr.Garcia is a business professor at a large state college.At the start of each workday,he opens a Web browser on his office computer and accesses the university's Web site.From there,he logs into his institution's "MyCollege" portal with his username and password.From the portal he can access his email,Web pages for each of his courses,and confidential information about the students he advises.Most likely,Dr.Garcia is using what kind of network when using the portal?

A)Extranet
B)Intranet
C)Socialnet
D)Virtual Private Network (VPN
Question
When Julie Smith wants to find information on the Internet,she uses the Google search engine.But when she wants to find a document or data set created by her company for internal purposes only,she logs into the company ________.

A)VPN
B)Intranet
C)Cloud
D)Extranet
Question
Efficient Auto Parts is a wholesale distributor.They purchase auto parts in bulk from manufacturers and sell in smaller quantities to regional retail outlets.They understand that carrying excess inventory can be expensive.On the other hand,running out of inventory can lead to lost business.Therefore,they have created a network that their suppliers can log into to check inventory levels for the parts they sell.When inventory levels reach an agreed upon level,the supplier automatically sends more to the distributor,with all the documentation being handled electronically.This system is most likely part of what kind of network?

A)Intranet
B)Extranet
C)VPN
D)Socialnet
Question
Unilever's web-based database,the Transportation Business Center (TBC),provides its 30 contract carriers with site specification requirements about pick-up and delivery locations.The TBC contains information such as contact names and phone numbers,operating hours,the number of dock doors at a location,the height of the dock doors,how to make an appointment to deliver or pick up shipments,pallet configuration,and other special requirements.Unilever's practice of providing this kind of information over a network with its carriers is an example of:

A)Enterprise use of Intranets
B)Brainstorming
C)Virtual collaboration
D)Enterprise search
Question
When security issues are a special concern,companies want to take extra steps to make sure that transmissions can't be intercepted or compromised.In these situations they will use a network that encrypts the packets before they are transferred over the network.This solution is called a(n)___________________.

A)Intranet
B)Extranet
C)Virtual Private Network (VPN)
D)SecureNet
Question
According to your text,developing software for wireless devices had been challenging because ________________.

A)Until recently,the market was not large enough to justify large scale investment in the development of software apps.
B)Restrictions imposed by 2 or 3 dominate hardware manufacturers
C)There has not been a widely accepted standard for wireless devices.
D)Wireless devices are significantly more complex than traditional computing devices.
Question
The connection of two Bluetooth devices is called:

A)pairing
B)collaboration
C)activation
D)mashup
Question
The source of IoT data is the _________.

A)computer chip
B)sensors
C)broadband connection
D)Bluetooth
Question
A(n)_______________ is a private,company-owned network that can be logged into remotely via the Internet.Typical users are suppliers,vendors,partners,or customers.

A)Intranet
B)Extranet
C)Virtual Private Network (VPN
D)Socialnet
Question
The standard way computers connect to a wireless network is called:

A)Bluetooth
B)WiFi
C)5G
D)Pairing
Question
Group activities devoted to idea generation can be hindered when members of the group are geographically dispersed,have conflicting schedules or any other reasons that prevents the group from meeting face to face.An effective solution to these problems is ____________.

A)Sharing ideas by email
B)Cloud brainstorming apps such as Evernote and iMindmap Online
C)Posting ideas to social media sites such as YouTube,Pinterest or Twitter
D)Forming workgroups with people that work in the same location or have compatible schedules.
Question
Different CPUs,operating systems,storage media,and mobile platform environments characterize the mobile device marketplace.This creates significant challenges for:

A)Mobile device retailers
B)Mobile software developers
C)Government regulators
D)Strategic Planners
Question
The success or failure of group work depends on a set of factors and processes known as _______________.

A)Team work
B)Key Performance Indicators (KPIs)
C)Group dynamics
D)Effective leadership
Question
A(n)____________ is a widely used type of network based on Internet technology (e.g.browsers,Internet protocols,etc. )but focused on serving the internal informational needs of a company.

A)Intranet
B)Extranet
C)Virtual Private Network (VPN
D)Socialnet
Question
How does a virtual private network (VPN)provide additional security over other types of networks?

A)It requires a username and password for access.
B)It encrypts data packets prior to transmission.
C)Users are required to answer a set of "challenge questions" prior to being given access.
D)Users are required to pass a retinal scan,finger print scan or some other high level security test before they can access the network.
Question
Wal-Mart provides P&G access to sales information on every item Wal-Mart buys from P&G.The information is collected by P&G on a daily basis from every Wal-Mart store,and P&G uses the information to manage the inventory replenishment for Wal-Mart.This is an example of:

A)Virtual collaboration
B)Enterprise use of Intranets
C)VoIP technologies
D)Enterprise social media
Question
Circuit switching involves a dedicated connection between a source and a destination,such as when a voice call is placed between two landline telephones.
Question
Voice over IP (VoIP)networks carry voice calls by converting voice (analog signals)to digital signals that are sent as packets.
Question
IPv4 addresses have 4 groups of four alphanumeric characters,which allow for 2^32 or roughly 4.3 billion unique IP addresses.
Question
Broadband is the capacity,or throughput per second of a network.
Question
A router acts as a controller,enabling networked devices to talk to each other efficiently.
Question
Five basic functions of business networks are communication,mobility,collaboration,relationships,and search.
Question
An API provides a standard way for different things,such as software,content,or websites,to talk to each other in a way that they both understand,but it requires extensive programming.
Question
Each device attached to a network has a unique IP address that enables it to send and receive files.
Question
Very large data transfers over broadband networks do not reduce the bandwidth availability for others on the network.
Question
A broadband network is one with high capacity or bandwidth.
Question
In April 2014,ARIN reported that IPv4 addresses were running out,and therefore enterprises needed to re-use or duplicate their IP addresses.
Question
Network traffic is shaped by delaying the flow of less important network traffic,such as bulk data transfers,P2P file-sharing programs,and BitTorrent traffic.
Question
Which of the following is not considered by organizations to be an advantage of using IoT?

A)Ability to monitor performance,quality and reliability of products and services
B)Gaining insight into new products and services
C)Security of networks and data gathered
D)Remote troubleshooting of products
Question
The City of Santander,Spain monitors many aspects of city life through the transmissions of _________ embedded throughout the city.

A)fiber optic cable
B)sensors
C)Bluetooth
D)VPNs
Question
5G will offer huge gains in both speed and capacity over existing 4G networks-along with opportunities at the operations and strategic levels.
Question
Network capacity is measured in terms of its throughput,or bandwidth
Question
The higher the required QoS,the less expensive the technologies needed to manage organizational networks.
Question
Files are broken down into blocks known as protocols in order to be transmitted over a network to their destination.
Question
IPv6 addresses have 6 groups of alphanumeric characters,which allow for 2^106 addresses.
Question
Applications for voice conversations and video streaming typically perform poorly on broadband networks.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/135
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: Networks, Collaborative Technology, and the Internet of Things
1
In terms of digital transmissions,_______ transfers data in small blocks based on the destination IP address.

A)Chunking
B)Circuit switching
C)Packet switching
D)IP Streaming
C
2
Network capacity is measured in terms of its ________.

A)Protocol
B)Size
C)IP version
D)Bandwidth
D
3
________ is the method by which data are sent from one device to another via a network.

A)API
B)5G
C)Bandwidth
D)IP
D
4
Bandwidth-intensive apps are important to business processes,but they also strain network capabilities and resources.One strategy for regulating a network's quality or service is to "prioritize traffic" which means:

A)Allocating network resources to users based on seniority in the organization
B)Data and apps that are sensitive to time-delay are given priority on the network
C)Giving priority to mobile transmissions to avoid bottlenecks
D)Restricting traffic from voice and video apps that disproportionally use network bandwidth to times when demand for network resources is low
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
5
Sony realized that the technical limitations of____ were making it urgent to move to ________.

A)64-bit addresses;128-bit version
B)IPv4addresses;IPv6
C)IP addresses;mobile networks
D)3G addresses;4Gor 5G networks
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
6
Every device that communicates with a network must have a unique identifying ________

A)API
B)IP address
C)protocol
D)VoIP
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
7
In terms of network capacity,a pipeline analogy is often used.The larger the diameter of the pipe,the greater the throughput (volume)of water that flows through it and the faster water is being transferred through it.This analogy refers to a network's ___________.

A)Packet router
B)Transmission protocols
C)Connectivity
D)Bandwidth
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following decides how the digital 1's and 0's are represented in terms of voltage and frequencies?

A)Signal frequency spectrum
B)Bandwidth
C)Switches and routers
D)Modulation and coding
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
9
Network ________ are devices that transmit ________from their source to their destination based on IP addresses.

A)switches and routers: data packets
B)APIs;data packets
C)routers;digital signals
D)firewalls;digital signals
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
10
With _________,voice and data transmissions travel in packets over telephone wires.

A)VoIP
B)MP3 or MP4
C)TCP/IP
D)Wi-Fi
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
11
To insure QoS of a network,an alternative to "prioritizing traffic" is to __________,which means holding back traffic from non-time sensitive apps so that apps like voice and video run more effectively.

A)Throttle traffic
B)Block traffic
C)Re-direct traffic
D)Filter traffic
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
12
Basic functions of business networks are all of the following except _______.

A)Search
B)Mobility
C)Collaboration
D)Routers
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following about IPv4 is false?

A)It has been Internet protocol for over three decades.
B)It is easy to configure and to change ISP.
C)It has reached the limits of its design.
D)It is being replaced with IPv6.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
14
_________ networks are high capacity digital networks.

A)Circuit
B)Narrowband
C)Broadband
D)Smart grid
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
15
An important management decision concerns the network's _________ especially for delay-sensitive data such as real-time voice and high-quality video.

A)Size and Scope
B)Availability and number of access points
C)Mobility
D)Quality of service (QoS)
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
16
Investments in data networks,IP addresses,routers,and switches are ________ because of their impact on productivity,security,user experiences,and customer service.

A)telecommunication basics
B)tactical issues
C)technology decisions
D)business decisions
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
17
All generations of networks are based on ________.

A)switching
B)wireless
C)The cloud
D)circuits
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
18
____________ is older technology for transmitting signals that originated with telephone calls;and is inefficient for digital transmission.

A)Chunking
B)Circuit switching
C)Packet switching
D)IP Streaming
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
19
_____________ are the rules and standards that govern how devices on a network exchange data and talk to each other.

A)Security settings
B)Organization's IT policies
C)Network protocols
D)Traffic priority procedures
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is not one of the basic functions of business networks?

A)Relationships
B)Strategic Planning
C)Search
D)Communication
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
21
Enterprises are moving away from ad hoc adoption of mobile devices and network infrastructure to a more strategic planning build-out of their mobile capabilities.Factors to be considered when planning the build out include all of the following except ________.

A)Demands of multi-tasking mobile devices on the network
B)Impact of mobile technology on organizational culture
C)More robust mobile OSs
D)Mobile applications
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
22
After Ford Motor Company began relying on UPS Logistics Group's data networks to track millions of cars and trucks and to analyze any potential problems before they occurred,Ford realized a ________ reduction in vehicle inventory.

A)$1 million
B)$5 million
C)$1 billion
D)$5 billion
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
23
Cable or DSL Internet connections are referred to as __________ broadband.

A)Mobile
B)Fixed-line
C)3G mobile
D)4G mobile
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following represents the primary perspective of people who oppose Net Neutrality?

A)They are concerned about a growing risk to privacy and ability to transmit data securely over the Internet.
B)They argue that there have always been different levels of Internet service and that a two-tiered system would enable more freedom of choice and promote e-commerce.
C)They are concerned that the government is not doing enough to properly regulate the Internet.
D)They are concerned about the growth of traffic shaping because it has the potential to slow transmission of certain types of data or content.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
25
In most organizations today,when the network goes down,it causes ___________.

A)Little or no disruption
B)Minor disruption of productivity or service
C)Significant disruption of productivity or service
D)Almost complete disruption of productivity or service,including lost sales,financial consequences and inability to process payroll and inventory.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
26
Mobile infrastructure consists of the integration of all of the following factors except ________.

A)Devices
B)Support
C)Security measures
D)Personnel
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following statements represents the primary concerns of people who are in favor of Net Neutrality?

A)They fear that ISPs will be able to block content representing controversial points of view or that access to high speed Internet transmission will be restricted to content providers who can pay for faster transmission.
B)They are concerned that ISPs will become over-regulated by government agencies.
C)They are concerned that ISPs will lose the ability to properly fund network expansion to accommodate the growing need for bandwidth intensive services.
D)They are concerned about growing risks to privacy and the ability to transmit data securely over the Internet.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following trends or transformations was not forecast in Cisco's most recent Visual Networking Index Forecast (VNI)?

A)Smartphones will reach 81% of mobile data traffic by 2020.
B)Number of mobile-connected devices will exceed the world's population.
C)A lot of traffic will be offloaded from cellular networks and onto public Wi-Fi networks.
D)80% of these new smartphone users will be located in Asia Pacific,the Middle East and Africa.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
29
Mobile networks and infrastructure have the potential to reduce healthcare costs.Tracking medical equipment and hospital inventory,such as gurneys,are done with _________ at a number of hospitals.

A)API
B)GPS
C)RFID tagging
D)Linux
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
30
Networking standards "802.11b","802.11a",and "802.11g" are different types of _____________ standards.

A)MIMO
B)DSL
C)Wi-Fi
D)Bluetooth
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is not true about the Net Neutrality debate?

A)ISPs need a financially sustainable way to pay for the costs of network expansion and upgrades so that the Internet can meet the growing needs of the people and organizations that use it.
B)A two-tiered system would make things more difficult for new,innovative businesses that lack the financial resources to pay for access to premium service levels.
C)The FCC's 2010 ruling allows ISPs to charge companies for faster data transmission - but does not allow ISPs to outright block content.
D)Almost all business organizations favor a two-tiered system whereas most individual users favor Net Neutrality.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
32
___________ is an umbrella term that applies to location-aware technologies that allow devices to communicate securely with each other over short distances.

A)GPS technology
B)Location sensitive apps
C)Geo-location technology
D)Near-field communications
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following is not a function of network protocols?

A)Send data to the correct recipient(s)
B)Physically transmit data
C)Determine encryption algorithm and convert message
D)Receive messages and send responses to the correct recipient
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
34
___________ is the practice of managing data transfer to ensure a certain level of performance or QoS.

A)Data filtering
B)Packet filtering
C)Circuit switching
D)Traffic shaping
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
35
The 4G networks are faster than 3G because 4G are all ____________ networks.

A)mobile
B)digital or IP
C)packet switched
D)wireless
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
36
IT developers use ________ to quickly and easily connect diverse data and services to each other and as gateways to popular apps such as Twitter,Facebook,and Amazon.

A)Mobile OS
B)APIs
C)SQL
D)SlashDB
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following statements best represents the position of people who are in favor of Net Neutrality?

A)The Internet should be free for everyone.
B)ISPs should treat all sources of data equally and not give priority to content providers who pay for faster transmission.
C)Providers of VoIP,video or other bandwidth intensive services should pay more to ISPs to carry their content because they use a disproportionate amount of network resources.
D)Users of video or similar bandwidth intensive services should pay more to ISPs for this content because they use a disproportionate amount of network resources.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
38
_____________ is a location-aware system that transmits the identity (in the form of a unique serial number)of an object or person using radio waves.It is used to track items in a supply chain or equipment in a production facility.

A)RFID
B)GIS
C)LTE
D)GSM
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
39
____________is the basic communication protocol of the Internet.This protocol is supported by every major network operating system (OS)to ensure that all devices on the Internet can communicate.

A)HTML
B)HTTP
C)TCP/IP
D)FTP
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
40
Mobile device apps that enable users to pay for things or check-in to hotels or venues use _________ technology.

A)GPS
B)GIS
C)TCP/IP
D)NFC
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
41
Which of these location-aware technologies is the most secure?

A)NFC
B)WiFi
C)Bluetooth
D)WiMAX
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
42
Amazon has enhanced its voice-automated Alexa with a new standard API called __________which increases the efficiency of the list feature.

A)Personal Lister
B)Voice Activator
C)List Skills
D)Catalog Expander
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
43
To reduce product development time,Caterpillar connected its engineering and manufacturing divisions with its active suppliers,distributors,overseas factories,and customers,through ________.

A)An extranet
B)An intranet
C)A Transportation Business Center
D)A third-party,value-added network
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
44
In basic terms,the IoT means that you can connect any device that has a(n)______ to the Internet or to each other.

A)computer chip
B)RFID tag
C)wireless card
D)on/off switch
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
45
Dr.Garcia is a business professor at a large state college.At the start of each workday,he opens a Web browser on his office computer and accesses the university's Web site.From there,he logs into his institution's "MyCollege" portal with his username and password.From the portal he can access his email,Web pages for each of his courses,and confidential information about the students he advises.Most likely,Dr.Garcia is using what kind of network when using the portal?

A)Extranet
B)Intranet
C)Socialnet
D)Virtual Private Network (VPN
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
46
When Julie Smith wants to find information on the Internet,she uses the Google search engine.But when she wants to find a document or data set created by her company for internal purposes only,she logs into the company ________.

A)VPN
B)Intranet
C)Cloud
D)Extranet
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
47
Efficient Auto Parts is a wholesale distributor.They purchase auto parts in bulk from manufacturers and sell in smaller quantities to regional retail outlets.They understand that carrying excess inventory can be expensive.On the other hand,running out of inventory can lead to lost business.Therefore,they have created a network that their suppliers can log into to check inventory levels for the parts they sell.When inventory levels reach an agreed upon level,the supplier automatically sends more to the distributor,with all the documentation being handled electronically.This system is most likely part of what kind of network?

A)Intranet
B)Extranet
C)VPN
D)Socialnet
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
48
Unilever's web-based database,the Transportation Business Center (TBC),provides its 30 contract carriers with site specification requirements about pick-up and delivery locations.The TBC contains information such as contact names and phone numbers,operating hours,the number of dock doors at a location,the height of the dock doors,how to make an appointment to deliver or pick up shipments,pallet configuration,and other special requirements.Unilever's practice of providing this kind of information over a network with its carriers is an example of:

A)Enterprise use of Intranets
B)Brainstorming
C)Virtual collaboration
D)Enterprise search
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
49
When security issues are a special concern,companies want to take extra steps to make sure that transmissions can't be intercepted or compromised.In these situations they will use a network that encrypts the packets before they are transferred over the network.This solution is called a(n)___________________.

A)Intranet
B)Extranet
C)Virtual Private Network (VPN)
D)SecureNet
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
50
According to your text,developing software for wireless devices had been challenging because ________________.

A)Until recently,the market was not large enough to justify large scale investment in the development of software apps.
B)Restrictions imposed by 2 or 3 dominate hardware manufacturers
C)There has not been a widely accepted standard for wireless devices.
D)Wireless devices are significantly more complex than traditional computing devices.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
51
The connection of two Bluetooth devices is called:

A)pairing
B)collaboration
C)activation
D)mashup
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
52
The source of IoT data is the _________.

A)computer chip
B)sensors
C)broadband connection
D)Bluetooth
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
53
A(n)_______________ is a private,company-owned network that can be logged into remotely via the Internet.Typical users are suppliers,vendors,partners,or customers.

A)Intranet
B)Extranet
C)Virtual Private Network (VPN
D)Socialnet
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
54
The standard way computers connect to a wireless network is called:

A)Bluetooth
B)WiFi
C)5G
D)Pairing
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
55
Group activities devoted to idea generation can be hindered when members of the group are geographically dispersed,have conflicting schedules or any other reasons that prevents the group from meeting face to face.An effective solution to these problems is ____________.

A)Sharing ideas by email
B)Cloud brainstorming apps such as Evernote and iMindmap Online
C)Posting ideas to social media sites such as YouTube,Pinterest or Twitter
D)Forming workgroups with people that work in the same location or have compatible schedules.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
56
Different CPUs,operating systems,storage media,and mobile platform environments characterize the mobile device marketplace.This creates significant challenges for:

A)Mobile device retailers
B)Mobile software developers
C)Government regulators
D)Strategic Planners
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
57
The success or failure of group work depends on a set of factors and processes known as _______________.

A)Team work
B)Key Performance Indicators (KPIs)
C)Group dynamics
D)Effective leadership
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
58
A(n)____________ is a widely used type of network based on Internet technology (e.g.browsers,Internet protocols,etc. )but focused on serving the internal informational needs of a company.

A)Intranet
B)Extranet
C)Virtual Private Network (VPN
D)Socialnet
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
59
How does a virtual private network (VPN)provide additional security over other types of networks?

A)It requires a username and password for access.
B)It encrypts data packets prior to transmission.
C)Users are required to answer a set of "challenge questions" prior to being given access.
D)Users are required to pass a retinal scan,finger print scan or some other high level security test before they can access the network.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
60
Wal-Mart provides P&G access to sales information on every item Wal-Mart buys from P&G.The information is collected by P&G on a daily basis from every Wal-Mart store,and P&G uses the information to manage the inventory replenishment for Wal-Mart.This is an example of:

A)Virtual collaboration
B)Enterprise use of Intranets
C)VoIP technologies
D)Enterprise social media
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
61
Circuit switching involves a dedicated connection between a source and a destination,such as when a voice call is placed between two landline telephones.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
62
Voice over IP (VoIP)networks carry voice calls by converting voice (analog signals)to digital signals that are sent as packets.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
63
IPv4 addresses have 4 groups of four alphanumeric characters,which allow for 2^32 or roughly 4.3 billion unique IP addresses.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
64
Broadband is the capacity,or throughput per second of a network.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
65
A router acts as a controller,enabling networked devices to talk to each other efficiently.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
66
Five basic functions of business networks are communication,mobility,collaboration,relationships,and search.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
67
An API provides a standard way for different things,such as software,content,or websites,to talk to each other in a way that they both understand,but it requires extensive programming.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
68
Each device attached to a network has a unique IP address that enables it to send and receive files.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
69
Very large data transfers over broadband networks do not reduce the bandwidth availability for others on the network.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
70
A broadband network is one with high capacity or bandwidth.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
71
In April 2014,ARIN reported that IPv4 addresses were running out,and therefore enterprises needed to re-use or duplicate their IP addresses.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
72
Network traffic is shaped by delaying the flow of less important network traffic,such as bulk data transfers,P2P file-sharing programs,and BitTorrent traffic.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
73
Which of the following is not considered by organizations to be an advantage of using IoT?

A)Ability to monitor performance,quality and reliability of products and services
B)Gaining insight into new products and services
C)Security of networks and data gathered
D)Remote troubleshooting of products
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
74
The City of Santander,Spain monitors many aspects of city life through the transmissions of _________ embedded throughout the city.

A)fiber optic cable
B)sensors
C)Bluetooth
D)VPNs
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
75
5G will offer huge gains in both speed and capacity over existing 4G networks-along with opportunities at the operations and strategic levels.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
76
Network capacity is measured in terms of its throughput,or bandwidth
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
77
The higher the required QoS,the less expensive the technologies needed to manage organizational networks.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
78
Files are broken down into blocks known as protocols in order to be transmitted over a network to their destination.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
79
IPv6 addresses have 6 groups of alphanumeric characters,which allow for 2^106 addresses.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
80
Applications for voice conversations and video streaming typically perform poorly on broadband networks.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 135 flashcards in this deck.