QUESTIONS GRADE A+
The device that acts as a connection point between computers and can filter and forward data
to a specified destination is called a(n): - ANSWERSswitch.
The Internet is based on which three key technologies? - ANSWERSClient/server computing,
packet switching, and the development of communications standards for linking networks and
computers
The method of slicing digital messages into parcels, transmitting them along different
communication paths, and reassembling them at their destinations is called: - ANSWERSpacket
switching.
In TCP/IP, IP is responsible for: - ANSWERSdisassembling and reassembling of packets during
transmission.
In a telecommunications network architecture, a protocol is: - ANSWERSa standard set of rules
and procedures for control of communications in a network.
Which type of network serves a small group of computers, allowing them to share resources
and peripherals without using a dedicated server? - ANSWERSPeer-to-peer
Which of the following is considered by many to be the defining Web 2.0 application? -
ANSWERSSocial networking
Which of the following enables multiple users to create and edit Web documents? -
ANSWERSWiki
,A network that covers entire geographical regions is most commonly referred to as a(n): -
ANSWERSwide area network.
Which of the following is a challenge posed by Wi-Fi networks? - ANSWERSSusceptibility to
interference from nearby wireless systems
T lines: - ANSWERSare high-speed, leased data lines providing guaranteed service levels.
Which protocol is the Internet based on? - ANSWERSTCP/IP
What service converts IP addresses into more recognizable alphanumeric names? -
ANSWERSDNS
IPv6 is being developed in order to: - ANSWERScreate more IP addresses.
Which of the following statements about RFID is not true? - ANSWERSRFIDs require line-of-sight
contact to be read.
________ integrate(s. disparate channels for voice communications, data communications,
instant messaging, e-mail, and electronic conferencing into a single experience. -
ANSWERSUnified communications
A VPN: - ANSWERSis an encrypted private network configured within a public network.
The most common Web server today, controlling 65 percent of the market, is: -
ANSWERSApache HTTP Server.
, Which of the following statements is not true about search engines? - ANSWERSThere are
hundreds of search engines vying for user attention, with no clear leader having yet emerged.
Which of the following is an example of the "visual Web"? - ANSWERSPinterest
Which process is used to protect transmitted data in a VPN? - ANSWERSTunneling
The 802.11 set of standards is known as: - ANSWERSWi-Fi.
The WiMax standard can transmit up to a distance of approximately: - ANSWERS30 miles.
Prior to the development of ________, computer networks used leased, dedicated telephone
circuits to communicate with other computers in remote locations. - ANSWERSpacket switching
In Europe, and much of the world, the standard for cellular services is: - ANSWERSGSM.
Electronic data are more susceptible to destruction, fraud, error, and misuse because
information systems concentrate data in computer files that: - ANSWERSmay be accessible by
anyone who has access to the same network.
Specific security challenges that threaten the communications lines in a client/server
environment include: - ANSWERStapping; sniffing; message alteration; radiation.
Which of the following statements about the Internet security is not true? - ANSWERSVoIP is
more secure than the switched voice network.
An independent computer program that copies itself from one computer to another over a
network is called a: - ANSWERSworm.