CHAPTER 7

Telephone networks are fundamentally different from computer networks.
True
Increasingly, voice, video, and data communications are all based on Internet technology.
True
Firms in the past used two fundamentally different types of networks: telephone networks and computer networks.
True
Due to continuing telecommunications deregulation and information technology innovation, telephone and computer networks are slowly converging into a single digital network using shared Internet-based standards and equipment.
True
Increasingly, voice and data communication as well as Internet access are taking place over broadband wireless platforms, such as cell phones, handheld digital devices, and PCs in wireless networks.
True
Each computer on the network contains a network interface device called a network operating card (NOC).
False
Contemporary digital networks and the Internet are based on four key technologies: client/server computing, the use of packet switching, the development of widely used communications standards and PC operating systems.
False
Pocket switching is a method of slicing digital messages into parcels called pockets, sending the pockets along different communication paths as they become available, and then reassembling the pockets once they arrive at their destinations.
False
Packet switching makes much less efficient use of the communications capacity of a network.
False
TCP refers to the Transmission Control Protocol (TCP), which is responsible for the delivery of packets and includes the disassembling and reassembling of packets during transmission.
False
IP refers to the Internet Protocol (IP), establishes a connection between the computers, sequences the transfer of packets, and acknowledges the packets sent.
False
A digital signal is represented by a continuous waveform that passes through a communications medium; analog signals are used for voice communication.
False
A analog signal is a discrete, binary waveform, rather than a continuous waveform.
False
A modem is a device that translates digital signals from a computer into analog form so that they can be transmitted over analog telephone lines.
True
A local-area network (LAN) is designed to connect personal computers and other digital devices within a half-mile or 500-metre radius.
True
The most common LAN operating systems are Windows, Linux, and Novell.
True
Ethernet is the dominant LAN standard at the physical network level, specifying the physical medium to carry signals between computers; access control rules; and a standardized set of bits used to carry data over the system.
True
A peer-to-peer network treats all processors equally and is used primarily in small networks with 10 or fewer users.
True
Sometimes LANs are described in terms of the way their components are connected together, or their topology.
True
In a bus topology, one station transmits signals, which travel in both directions along a single transmission segment.
True
Wide-area networks (WAN) is a network that spans a metropolitan area, usually a city and its major suburbs.
False
Metropolitan-area network (MAN)span broad geographical distances-entire regions, states, continents, or the entire globe.
False
Twisted wire consists of strands of copper wire twisted in pairs and is an older type of transmission medium.
True
Microwave systems, both terrestrial and celestial, transmit high-frequency radio signals through the atmosphere and are widely used for high-volume, long-distance, point-to-point communication.
True
The range of frequencies that can be accommodated on a particular telecommunications channel is called its bandwidth.
True
An Internet service provider (ISP) is a commercial organization with a temporary connection to the Internet that sells permanent connections to retail subscribers.
False
Digital subscriber line (DSL) provided by cable television vendors use digital cable coaxial lines to deliver high-speed Internet access to homes and businesses.
False
The domain name is the English-like name that corresponds to the unique 32-bit numeric IP address for each computer connected to the Internet.
False
To connect two computers together in the same office, you must have a computer network
True
An NOS must reside on a dedicated server computer in order to manage a network.
False
A hub is a networking device that connects network components and are used to filter and forward data to specified destinations on the network.
False
In a client/server network, a network server provides every connected client with an address so it can be found by others on the network.
True
Central large mainframe computing has largely replaced client/server computing.
False
Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching.
False
A protocol is a standard set of rules and procedures for the control of communications in a network.
True
Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.
True
In a ring topology, one station transmits signals, which travel in both directions along a single transmission segment.
False
Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.
True
Fibre-optic cable is more expensive and harder to install than wire media.
True
The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes.
False
The success of the Internet is in part due to its design as an infinitely scalable network capable of handling millions of users.
False
VoIP technology delivers video information in digital form using packet switching.
False
Web 2.0 is the collaborative effort led by the World Wide Web Consortium to add a layer of meaning atop the existing Web to reduce the amount of human involvement in searching for and processing Web information.
False
Wi-Fi enables users to freely roam from hotspot to hotspot even if the hotspot is using different Wi-Fi network services.
False
WiMax has a wireless access range of up to 300 feet.
False
RFID has been exceptionally popular because of its low implementation costs.
False
In a few years, more than 80 percent of the Internet users in North America will use smartphones and mobile netbooks to access the Internet.
False
The Aviation layer is responsible for providing the Application layer with communication and packet services.
False
The Transport Interface layer is responsible for placing packets on and receiving them from the network medium, which could be any networking technology.
False
Every computer on the Internet is assigned the same Internet Protocol (IP) address, which currently is a 32-bit number represented by four strings of numbers ranging from 0 to 255 separated by periods.
False
Internet2 and Next-Generation Internet (NGI) are consortia representing 200 universities, private businesses, and government agencies in the United States working on a new, robust, high-bandwidth version of the Internet.
True
Proponents of net neutrality also argue that a neutral Internet encourages everyone to innovate without permission from the phone and cable companies or other authorities, and this level playing field has spawned countless new businesses.
True
Network owners believe regulation to enforce net neutrality will impede competitiveness by stifling innovation, discouraging capital expenditures for new networks, and curbing their networks’ ability to cope with the exploding demand for Internet and wireless traffic.
True
Canadian Internet service lags behind that of many other nations in overall speed, cost, and quality of service, adding credibility to this argument.
True
Newsgroups are worldwide discussion groups posted on Internet electronic bulletin boards on which people share information and ideas on a defined topic, such as radiology or rock bands.
True
Search engines attempt to solve the problem of finding useful information on the Web nearly instantly and, arguably, they are the “killer app” of the Internet era.
True
A device that acts as a connection point between computers and can filter and forward data to a specified destination is called a
A) hub.
B) switch.
C) router.
D) NIC.
B) switch
The Internet is based on which three key technologies?
A) TCP/IP, HTML, and HTTP
B) TCP/IP, HTTP, and packet switching
C) Client/server computing, packet switching, and the development of communications standards for linking networks and computers
D) Client/server computing, packet switching, and HTTP
C) client/server computing, packet switching, and the development of communications standards for linking networks and computers
The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called
A) multiplexing.
B) packet switching.
C) packet routing.
D) ATM.
B) packet switching
The telephone system is an example of a ________ network.
A) peer-to-peer
B) wireless
C) packet-switched
D) circuit-switched
D) circuit-switched
Which of the following is NOT a characteristic of packet switching?
A) Packets travel independently of each other.
B) Packets are routed through many different paths.
C) Packet switching requires point-to-point circuits.
D) Packets include data for checking transmission errors.
C) packet switching requires point-to-point circuits
In TCP/IP, IP is responsible for
A) disassembling and reassembling of packets during transmission.
B) establishing an Internet connection between two computers.
C) moving packets over the network.
D) sequencing the transfer of packets.
A) disassembling and reassembling of packets during transmission
In a telecommunications network architecture, a protocol is
A) a device that handles the switching of voice and data in a local area network.
B) a standard set of rules and procedures for control of communications in a network.
C) a communications service for microcomputer users.
D) the main computer in a telecommunications network.
B) a standard set of rules and procedures for control of communications in a network
The four layers of the TCP/IP reference model are
A) physical layer, application layer, transport layer, and the network interface layer.
B) physical layer, application layer, Internet layer, and the network interface layer.
C) application layer, transport layer, Internet layer, and the network interface layer.
D) application layer, hardware layer, Internet layer, and the network interface layer.
C) application layer, transport layer, Internet layer, and the network interface layer
Which signal types are represented by a continuous waveform?
A) laser
B) optical
C) digital
D) analog
A) laser
To use an analog telephone system for sending digital data, you must use:
A) a modem.
B) a router.
C) DSL.
D) twisted wire.
A) a modem
Which type of network is used to connect digital devices within a half-mile or 500-metre radius?
A) microwave
B) LAN
C) WAN
D) MAN
B) LAN
Which type of network treats all processors equally, and allows peripheral devices to be shared without going to a separate server?
A) peer-to-peer
B) wireless
C) LAN
D) ring
A) peer-to-peer
Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents?
A) wireless network in infrastructure mode
B) domain-based LAN
C) peer-to-peer network
D) campus area network
C) peer-to-peer network
In a bus network
A) signals are broadcast to the next station.
B) signals are broadcast in both directions to the entire network.
C) multiple hubs are organized in a hierarchy.
D) messages pass from computer to computer in a loop.
B) signals are broadcast in both directions to the entire network
All network components connect to a single hub in a ________ network.
A) star
B) bus
C) domain
D) peer-to-peer
A) star
The most common ethernet topology is
A) bus.
B) star.
C) ring.
D) mesh.
A) bus
A network that spans a city, and sometimes its major suburbs as well, is called a
A) CAN.
B) MAN.
C) WAN.
D) LAN.
B) MAN
A network that covers entire geographical regions is most commonly referred to as a(n):
A) local area network.
B) intranet.
C) peer-to-peer network.
D) wide area network.
D) wide area network
________ work(s) by using radio waves to communicate with radio antennas placed within adjacent geographic areas.
A) Cell phones
B) Microwaves
C) Satellites
D) WANs
A) cell phones
Bandwidth is the
A) number of frequencies that can be broadcast through a medium.
B) number of cycles per second that can be sent through a medium.
C) difference between the highest and lowest frequencies that can be accommodated on a single channel.
D) total number of bytes that can be sent through a medium per second.
C) difference between the highest and lowest frequencies that can be accommodated on a single channel
The total amount of digital information that can be transmitted through any telecommunications medium is measured in
A) bps.
B) Hertz.
C) baud.
D) gigaflops.
A) bps
Digital subscriber lines
A) operate over existing telephone lines to carry voice, data, and video.
B) operate over coaxial lines to deliver Internet access.
C) are very-high-speed data lines typically leased from long-distance telephone companies.
D) have up to twenty-four 64-Kbps channels.
A) operate over existing telephone lines to carry voice, data, and video
T lines
A) operate over existing telephone lines to carry voice, data, and video.
B) operate over coaxial lines to deliver Internet access.
C) are very-high-speed data lines typically leased from long-distance telephone companies.
D) have up to twenty-four 64-Kbps channels.
C) are very-high-speed data lines typically leased from long-distance telephone companies
Which protocol is the Internet based on?
A) TCP/IP
B) FTP
C) packet-switching
D) HTTP
A) TCP/IP
What service converts IP addresses into more recognizable alphanumeric names?
A) HTML
B) DNS
C) IP
D) HTTP
B) DNS
The child domain of the root is the
A) top-level domain.
B) second-level domain.
C) host name.
D) domain extension.
A) top-level domain
In the domain name “http://myspace.blogging.com,” what are the root, top-level, second-level, and third-level domains, respectively?
A) “http://”, myspace, blogging, com
B) “http://”, com, blogging, myspace
C) “.”, com, blogging, myspace
D) “.”, myspace, blogging, com
C) “.”, com, blogging, mypsace
Which organization helps define the overall structure of the Internet?
A) none (no one “owns” the Internet)
B) W3C
C) ICANN
D) IAB
D) IAB
IPv6 is being developed in order to
A) update the packet transmission protocols for higher bandwidth.
B) create more IP addresses.
C) allow for different levels of service.
D) support Internet2.
B) create more IP addresses
Which of the following services enables logging on to one computer system and working on another?
A) FTP
B) LISTSERV
C) Telnet
D) World Wide Web
C) Telnet
Instant messaging is a type of ________ service.
A) chat
B) cellular
C) Web
D) wireless
A) chat
The need in some cases for employees to have access to sexually explicit material on the Internet, such as medical researchers, suggests that companies
A) cannot restrict Internet use.
B) need specialized software to determine which types of material are acceptable.
C) may need to maintain a database of acceptable Web sites.
D) need to base their Internet use policies on the needs of the organization and culture.
D) need to base their Internet use policies on the needs of the organization and culture
________ integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience.
A) Wireless networks
B) Intranets
C) Virtual private networks
D) Unified communications
D) unified communications
A VPN
A) is an encrypted private network configured within a public network.
B) is more expensive than a dedicated network.
C) provides secure, encrypted communications using Telnet.
D) is an Internet-based service for delivering voice communications
A) is an encrypted private network configured within a public network
Web browser software requests Web pages from the Internet using which protocol?
A) URL
B) HTTP
C) DNS
D) HTML
B) HTTP
Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n)
A) uniform resource locator.
B) unified resource locator.
C) third level domain.
D) root domain.
A) uniform resource locator
The open-source Web server that controls 54 percent of the market is
A) Microsoft IIS.
B) ASP.net.
C) Apache HTTP server.
D) Netscape.
C) Apache HTTP server
What technology allows people to have content pulled from Web sites and fed automatically to their computers?
A) FTP
B) RSS
C) HTTP
D) Bluetooth
B) RSS
To keep internal data secure, a company employing an extranet must be sure to put a ________ in place.
A) router
B) server
C) firewall
D) switch
C) firewall
A network that connects authorized customers, suppliers, and other business partners to portions of a firm’s internal network is called a(n)
A) intranet.
B) extranet.
C) enterprise network.
D) virtual private network.
B) extranet
Which generation of network are wireless cellular phone systems entering?
A) 2.5G
B) 3G
C) 3.5G
D) 4G
B) 3G
CDMA
A) is the major European digital cellular standard.
B) is more expensive than GSM.
C) transmits over several frequencies.
D) uses the 1.9 GHz band.
C) transmits over several frequencies
The most appropriate wireless networking standard for creating PANs is
A) I-mode.
B) IEEE 802.11b.
C) WiFi.
D) Bluetooth.
D) Bluetooth
Bluetooth can be used to link up to ________ devices within a 10-metre area using low-power, radio-based communication.
A) four
B) six
C) eight
D) ten
C) eight
The Wi-Fi 802.11a standard can transmit up to
A) 54 Mbps in the 5-GHz frequency range.
B) 11 Mbps in the 2.4-GHz frequency range.
C) 54 Mbps in the 2.4-GHz frequency range.
D) 722 Kbps in the 2.4-GHz frequency range.
A) 54 Mbps in the 5-GHz frequency range
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as
A) touch points.
B) hotspots.
C) hot points.
D) wireless hubs.
B) hotspots
The IEEE standard for the WiMax is
A) IEEE 802.15.
B) IEEE 802.11.
C) IEEE 802.16.
D) IEEE 802.20.
C) IEEE 802.16
The WiMax standard can transmit up to a distance of approximately
A) 30 metres.
B) 500 metres.
C) 30 miles.
D) 5 miles.
C) 30 miles
Passive RFID tags
A) have their own power source.
B) have a range of several feet.
C) enable data to be rewritten and modified.
D) are used in automated toll-collection systems.
B) have a range of several feet
________ are very simple devices that connect network components, sending a packet of data to all other connected devices.
A) Hubs
B) Switches
C) Routers
D) NOS
A) Hubs
A ________ has more intelligence than a hub and can filter and forward data to a specified destination on the network.
A) hub
B) switch
C) router
D) NOS
B) switch
A ________ is a special communications processor used to route packets of data through different networks, ensuring that the data sent gets to the correct address.
A) hub
B) switch
C) router
D) NOS
C) router
109) The ________ routes and manages communications on the network and coordinates network resources.
A) hub
B) switch
C) router
D) NOS
D) NOS
John is evaluating the new system of computing that has just been installed in his firm. The new ________ computing has extended computing to various departments, workgroups, factory floors, and other parts of the business that could not be served by the centralized architecture that was replaced with this new system.
A) client/server
B) mainframe
C) PDA
D) customer/client
A) client/server
The ________ enables client application programs to access the other layers and defines the protocols that applications use to exchange data. One of these application protocols is the Hypertext Transfer Protocol (HTTP), which is used to transfer Web page files.
A) application layer
B) transport layer
C) internet layer
D) network interface layer
A) application layer
Bob is trying to decide which type of physical transmission media to install that his LAN needs. Bob is in an older building in the downtown core of the city. He needs speeds up to 1 Gbps and the network needs to have a maximum run of 60 metres. Which type of transmission media is Bob going to install?
A) microwave systems
B) fibre optic cable
C) twisted wire
D) coaxial cable
C) twisted wire
Larry is trying to decide which type of physical transmission media to install for his LAN needs. Larry’s firm is in a very large building. He needs speeds up to 1 Gbps and the network needs to have a maximum run of 140 metres. Which type of transmission media is Larry going to install?
A) microwave systems
B) fibre optic cable
C) twisted wire
D) coaxial cable
D) coaxial cable
Sally is the head of CTV News in Canada. CTV is having trouble with their network because they have too much data to transfer for the current physical transmission media that is in place. Sally knows that much of the data they transfer is video and lots of it. Which type of media should Sally consider as they perform this upgrade?
A) microwave systems
B) fibre optic cable
C) twisted wire
D) coaxial cable
B) fibre optic cable
Gordon is wondering what is the best physical transmission media to use for high-volume, long-distance, point-to-point communication that his firm needs. Which media should Gordon consider for his situation?
A) microwave systems
B) fibre optic cable
C) twisted wire
D) coaxial cable
A) microwave systems
Internet data traffic is carried over transcontinental high-speed backbone networks that generally operate today in the range of 45 Mbps to 2.5 Gbps. These trunk lines are typically owned by ________.
A) network service providers
B) regional telephone and cable companies
C) ISP
D) coaxial cable
A) network service providers
Local connection lines are owned by regional ________ that connect retail users in homes and businesses to the Internet.
A) network service providers
B) telephone and cable television companies
C) ISP
D) coaxial cable
B) telephone and cable television companies
The regional networks lease access to ________.
A) network service providers
B) telephone and cable television companies
C) ISPs, private companies, and government institutions.
D) coaxial cable
C) ISPs, private companies, and government institutions
Network neutrality is the idea that Internet service providers must allow customers ________.
A) unequal access to content and applications, regardless of the source or nature of the content
B) equal access to content and applications, regardless of the source or nature of the content
C) equal access to content and applications, depending on the source or nature of the content
D) unequal access to content and applications, depending on the source or nature of the content
B) equal access to content and applications, regardless of the source or nature of the content
Canadian companies have the ________.
A) legal right to monitor what employees are doing with non-company equipment during business hours
B) legal right to monitor what employees are doing with company equipment during business hours
C) legal right to monitor what customer are doing with non-company equipment during business hours
D) ethical right to monitor what employees are doing with company equipment during business hours.
B) legal right to monitor what employees are doing with company equipment during business hours
Based on your reading of the examples in the chapter, what would be the best use of RFID for a business?
A) transactions
B) supply chain management
C) lowering network costs
D) enabling client communication
B) supply chain management
In a few years, more than ________ the Internet users in North America will use smartphones and mobile netbooks to access the Internet.
A) one-third
B) one-half
C) a quarter
D) three-quarters
B) one-half
The ________ layer is responsible for providing the Application layer with communication and packet services.
A) network interface
B) transport
C) Internet
D) application
B) transport
The ________layer is responsible for placing packets on and receiving them from the network medium, which could be any networking technology.
A) transport
B) network interface
C) Internet
D) application
B) network interface
Every computer on the Internet is assigned a unique ________ address, which currently is a 32-bit number represented by four strings of numbers ranging from 0 to 255 separated by periods.
A) transport protocol (TP)
B) Internet protocol (IP)
C) control protocol (CP)
D) layer protocol (LP)
B) internet protocol (IP)
______________ are consortia representing 200 universities, private businesses, and government agencies in the United States working on a new, robust, high-bandwidth version of the Internet.
A) Internet2 and Next-Generation Internet (NGI)
B) Internet3 and Next-Generation Internet (NGI)
C) Internet2 and Current-Generation Internet (CGI)
D) Internet3 and Current-Generation Internet (CGI)
A) Internet2 and Next-Generation Internet (NGI)
Proponents of ________ also argue that a neutral Internet encourages everyone to innovate without permission from the phone and cable companies or other authorities, and this level playing field has spawned countless new businesses.
A) net neutrality
B) net duality
C) net reality
D) net fairness
A) net neutrality
________ believe regulation to enforce net neutrality will impede competitiveness by stifling innovation, discouraging capital expenditures for new networks, and curbing their networks’ ability to cope with the exploding demand for Internet and wireless traffic.
A) Computer owners
B) Modem owners
C) Web site owners
D) Network owners
D) Network owners
Canadian Internet service ________that of many other nations in overall speed, cost, and quality of service, adding credibility to this argument.
A) surges ahead
B) equals
C) surpasses
D) lags behind
D) lags behind
________ are worldwide discussion groups posted on Internet electronic bulletin boards on which people share information and ideas on a defined topic, such as radiology or rock bands.
A) User groups
B) Internet groups
C) Web groups
D) Newsgroups
D) Newsgroups
________ attempt to solve the problem of finding useful information on the Web nearly instantly and, arguably, they are the “killer app” of the Internet era.
A) Web engines
B) Search engines
C) Internet engines
D) Optimization engines
B) Search engines
In search engine marketing, when users enter a search term at Google, Bing, Yahoo!, or any of the other sites serviced by these search engines, they receive two types of listings: ________ search results.
A) hyper links and unsponsored
B) sponsored links and unsponsored
C) sponsored links and hyper
D) positive links and negative
B) sponsored links unsponsored
Search engine ________ is the process of improving the quality and volume of Web traffic to a Web site by employing a series of techniques that help a Web site achieve a higher ranking with the major search engines when certain keywords and phrases are put in the search field.
A) concentration
B) optimization
C) internetation
D) extinction
B) optimization
________ use intelligent agent software for searching the Internet for shopping information.
A) Shipping bots
B) Shopping bots
C) Smart phones
D) Smart agents
B) shopping bots