Information Systems CH 6

Network neutrality is a policy whereby Internet service providers charge customers different rates for their Internet use based on the type of content they are downloading.

True
False

False

Broadband refers to a network with a high transmission capacity.

True
False

True

The following can be considered as broadband technologies (choose all that are correct):

A. Dial-up
B. DSL
C. Cable
D. All of these

B. DSL
C. Cable

A collection of the following devices ? two desktop computers, three laptops, two smart phones and a printer ? can be described as a(n):

A. LAN.
B. Network server.
C. WAN.
D. All of these.

A. LAN

A(n) ___ can consist of one or more ____ .

A. LAN, WANs
B. WAN, enterprise networks
C. LAN, enterprise networks
D. Enterprise network, LANs

D. Enterprise network, LANs

A modem can perform which of the following operations?

A. Convert analog signals to digital signals only
B. Convert digital signals to analog signals only
C. Both of the following are correct: Convert analog signals to digital signals only; and convert digital signals to analog signals only
D. Modems do not convert signals

C. Both of the following are correct: Convert analog signals to digital signals only; and convert digital signals to analog signals only

Fiber-optic cables are preferred over co-axial and twisted pair cables because (choose all that are correct):

A. Fiber optic cables are less difficult to tap.
B. Fiber optic cables are susceptible to interference.
C. Fiber optic cables have very high bandwidth.
D. Fiber optic cables offer higher security.

C. Fiber optic cables have very high bandwidth.
D. Fiber optic cables offer higher security.

Network protocols describe

A. The number of nodes in the network.
B. The rules for communication within the network.
C. The connections between the nodes in the network.
D. The number of nodes in the network and the connections between them.

B. The rules for communication within the network.

Ethernet, packet switching, HTTP, and TCP/IP are all examples of network protocols.

True
False

True

Distributed computing refers to the distribution of computing tasks among one or more computers.

True
False

True

An Intranet is a scaled-up version of the Internet that uses similar technologies.

True
False

False

An Intranet that allows limited access to its partners, suppliers, and customers is called a(n):

A. Secure Intranet
B. Extranet
C. Corporate Web site
D. Portal

B. Extranet

IPv6 will allow for ___ unique IP addresses.

A. 128
B. 32
C. 2128
D. 232

C. 2128

DNS are a convenient alternative to the difficult-to-remember IP naming system for computers.

True
False

True

A free software package is called a browser.

True
False

False

Most Internet search engines maintain an index of billions of Web pages. These indexes are updated using:

A. The users of the search engine.
B. Dedicated employees.
C. Automated webcrawlers.
D. A combination of all of these.

C. Automated webcrawlers

Networks enable which of the following application

A. Discovery
B. Communications
C. Collaboration
D. All of these

D. All of these

With _____, phone calls are treated as just another kind of data.

A. Voice over Internet Protocol
B. Chat rooms
C. Teleconference
D. All of these

A. Voice over Internet Protocol

Workflow, groupware, and telepresence systems are examples of which network application?

A. Discovery
B. Communications
C. Collaboration
D. None of these

C. Collaboration

The popularity of online classes and online universities can be attributed to which of the following network applications?

A. Discovery
B. Communications
C. Collaboration
D. All of these

D. All of these

Which of the following are advantages of computer networks?

A. They enable organizations to be more flexible.
B. They enable companies to share hardware, computer applications, and data.
C. They enable geographically dispersed employees to work together.
D. They provide a critical link between businesses and their customers.
E. All of the above.

E. All of the above

Voice and data communication networks are becoming more expensive.

True
False

False

Place the different types of computer networks in size order, ranging from smallest to largest.

A. LAN-PAN-MAN-WAN
B. PAN-MAN-WAN-LAN
C. PAN-LAN-MAN-WAN
D. PAN-MAN-LAN-WAN

C. PAN-LAN-MAN-WAN

__________ are high speed central networks to which multiple smaller networks connect

A. Network servers
B. Local area networks
C. Routers
D. Corporate backbone networks

D. Corporate backbone networks

Digital signals have two parameters, amplitude and frequency.

True
False

False

Which wireline communication has the highest security?

A. Coaxial cable
B. Fiber-optic cable
C. All of the wireline communications channels listed have good security and are difficult to tap.
D. Twisted-pair wire

B. Fiber-optic cable

Which transmission technology utilizes existing telephone lines?

A. T-carrier systems
B. DSL
C. ATM
D. SONET

B. DSL

Which of the following is not a basic function of transmission control protocol?

A. sequencing the transfer of packets
B. analyzing the packets for size
C. acknowledging that packets have been transferred
D. managing the movements of packets between computers

B. analyzing the packets for size

File sharing is a type of peer-to-peer processing.

True
False

True

The Internet is managed by a central agency which bears all the cost and responsibility.

True
False

False

If broadband is not available in your area, which of the following Internet connection methods would allow you to connect to the Internet?

A. You would able to connect using any of these methods
B. Satellite
C. Cable Modem
D. DSL

B. Satellite

Where in a domain name do you find the top-level domain (TLD)?

A. all the way to the left
B. all the way to the right
C. a TLD is not found within the domain name

B. all the way to the right

A browser is used to prevent web surfing.

True
False

False

_____ portals support communities such as hobby groups or a political party.

A. Corporate
B. Commercial
C. Industrywide
D. Personal
E. Affinity

E. Affinity

Many organizations have implemented corporate portals for which of the following reasons?

A. to cut costs
B. to free up time for busy managers
C. to improve profitability
D. to offer customers self-service opportunities
E. all of the above

E. All of the above

With _____, phone calls are treated as just another kind of data.

A. chat rooms
B. voice over IP
C. plain old telephone service
D. internet relay chat
E. teleconference

B. voice over IP

Workflow, groupware, and telepresence systems are examples of which network application?

A. Web services
B. Collaboration
C. Communications
D. None of these
E. Discovery

B. Collaboration

Computers typically work in isolation in modern organizations due to information security concerns.

True
False

False

A digital signal consists of a stream of digital bits.

True
False

True

The least expensive cable medium is:

A. Fiber-optic cable
B. Twisted-pair wire
C. Coaxial cable

B. Twisted-pair wire

Messages transmitted across the Internet are first divided into packets.

True
False

True

Servers are typically more powerful than client machines.

True
False

True

The ___ is the transport mechanism, while the ___ is the application that uses the transport mechanism.

A. Internet, WWW
B. WWW, intranet
C. WWW, Internet

A. Internet, WWW

A search engine that utilizes other search engines and integrates the results is a metasearch engine.

True
False

True

One of the drawbacks of telecommuting is that telecommuting employees have a lower chance at being promoted than employees who work in the office.

True
False

True