Deck 4: Networks, Collaborative Technology, and the Internet of Things

ملء الشاشة (f)
exit full mode
سؤال
In terms of digital transmissions,_______ transfers data in small blocks based on the destination IP address.

A)Chunking
B)Circuit switching
C)Packet switching
D)IP Streaming
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Network capacity is measured in terms of its ________.

A)Protocol
B)Size
C)IP version
D)Bandwidth
سؤال
________ is the method by which data are sent from one device to another via a network.

A)API
B)5G
C)Bandwidth
D)IP
سؤال
Bandwidth-intensive apps are important to business processes,but they also strain network capabilities and resources.One strategy for regulating a network's quality or service is to "prioritize traffic" which means:

A)Allocating network resources to users based on seniority in the organization
B)Data and apps that are sensitive to time-delay are given priority on the network
C)Giving priority to mobile transmissions to avoid bottlenecks
D)Restricting traffic from voice and video apps that disproportionally use network bandwidth to times when demand for network resources is low
سؤال
Sony realized that the technical limitations of____ were making it urgent to move to ________.

A)64-bit addresses;128-bit version
B)IPv4addresses;IPv6
C)IP addresses;mobile networks
D)3G addresses;4Gor 5G networks
سؤال
Every device that communicates with a network must have a unique identifying ________

A)API
B)IP address
C)protocol
D)VoIP
سؤال
In terms of network capacity,a pipeline analogy is often used.The larger the diameter of the pipe,the greater the throughput (volume)of water that flows through it and the faster water is being transferred through it.This analogy refers to a network's ___________.

A)Packet router
B)Transmission protocols
C)Connectivity
D)Bandwidth
سؤال
Which of the following decides how the digital 1's and 0's are represented in terms of voltage and frequencies?

A)Signal frequency spectrum
B)Bandwidth
C)Switches and routers
D)Modulation and coding
سؤال
Network ________ are devices that transmit ________from their source to their destination based on IP addresses.

A)switches and routers: data packets
B)APIs;data packets
C)routers;digital signals
D)firewalls;digital signals
سؤال
With _________,voice and data transmissions travel in packets over telephone wires.

A)VoIP
B)MP3 or MP4
C)TCP/IP
D)Wi-Fi
سؤال
To insure QoS of a network,an alternative to "prioritizing traffic" is to __________,which means holding back traffic from non-time sensitive apps so that apps like voice and video run more effectively.

A)Throttle traffic
B)Block traffic
C)Re-direct traffic
D)Filter traffic
سؤال
Basic functions of business networks are all of the following except _______.

A)Search
B)Mobility
C)Collaboration
D)Routers
سؤال
Which of the following about IPv4 is false?

A)It has been Internet protocol for over three decades.
B)It is easy to configure and to change ISP.
C)It has reached the limits of its design.
D)It is being replaced with IPv6.
سؤال
_________ networks are high capacity digital networks.

A)Circuit
B)Narrowband
C)Broadband
D)Smart grid
سؤال
An important management decision concerns the network's _________ especially for delay-sensitive data such as real-time voice and high-quality video.

A)Size and Scope
B)Availability and number of access points
C)Mobility
D)Quality of service (QoS)
سؤال
Investments in data networks,IP addresses,routers,and switches are ________ because of their impact on productivity,security,user experiences,and customer service.

A)telecommunication basics
B)tactical issues
C)technology decisions
D)business decisions
سؤال
All generations of networks are based on ________.

A)switching
B)wireless
C)The cloud
D)circuits
سؤال
____________ is older technology for transmitting signals that originated with telephone calls;and is inefficient for digital transmission.

A)Chunking
B)Circuit switching
C)Packet switching
D)IP Streaming
سؤال
_____________ are the rules and standards that govern how devices on a network exchange data and talk to each other.

A)Security settings
B)Organization's IT policies
C)Network protocols
D)Traffic priority procedures
سؤال
Which of the following is not one of the basic functions of business networks?

A)Relationships
B)Strategic Planning
C)Search
D)Communication
سؤال
Enterprises are moving away from ad hoc adoption of mobile devices and network infrastructure to a more strategic planning build-out of their mobile capabilities.Factors to be considered when planning the build out include all of the following except ________.

A)Demands of multi-tasking mobile devices on the network
B)Impact of mobile technology on organizational culture
C)More robust mobile OSs
D)Mobile applications
سؤال
After Ford Motor Company began relying on UPS Logistics Group's data networks to track millions of cars and trucks and to analyze any potential problems before they occurred,Ford realized a ________ reduction in vehicle inventory.

A)$1 million
B)$5 million
C)$1 billion
D)$5 billion
سؤال
Cable or DSL Internet connections are referred to as __________ broadband.

A)Mobile
B)Fixed-line
C)3G mobile
D)4G mobile
سؤال
Which of the following represents the primary perspective of people who oppose Net Neutrality?

A)They are concerned about a growing risk to privacy and ability to transmit data securely over the Internet.
B)They argue that there have always been different levels of Internet service and that a two-tiered system would enable more freedom of choice and promote e-commerce.
C)They are concerned that the government is not doing enough to properly regulate the Internet.
D)They are concerned about the growth of traffic shaping because it has the potential to slow transmission of certain types of data or content.
سؤال
In most organizations today,when the network goes down,it causes ___________.

A)Little or no disruption
B)Minor disruption of productivity or service
C)Significant disruption of productivity or service
D)Almost complete disruption of productivity or service,including lost sales,financial consequences and inability to process payroll and inventory.
سؤال
Mobile infrastructure consists of the integration of all of the following factors except ________.

A)Devices
B)Support
C)Security measures
D)Personnel
سؤال
Which of the following statements represents the primary concerns of people who are in favor of Net Neutrality?

A)They fear that ISPs will be able to block content representing controversial points of view or that access to high speed Internet transmission will be restricted to content providers who can pay for faster transmission.
B)They are concerned that ISPs will become over-regulated by government agencies.
C)They are concerned that ISPs will lose the ability to properly fund network expansion to accommodate the growing need for bandwidth intensive services.
D)They are concerned about growing risks to privacy and the ability to transmit data securely over the Internet.
سؤال
Which of the following trends or transformations was not forecast in Cisco's most recent Visual Networking Index Forecast (VNI)?

A)Smartphones will reach 81% of mobile data traffic by 2020.
B)Number of mobile-connected devices will exceed the world's population.
C)A lot of traffic will be offloaded from cellular networks and onto public Wi-Fi networks.
D)80% of these new smartphone users will be located in Asia Pacific,the Middle East and Africa.
سؤال
Mobile networks and infrastructure have the potential to reduce healthcare costs.Tracking medical equipment and hospital inventory,such as gurneys,are done with _________ at a number of hospitals.

A)API
B)GPS
C)RFID tagging
D)Linux
سؤال
Networking standards "802.11b","802.11a",and "802.11g" are different types of _____________ standards.

A)MIMO
B)DSL
C)Wi-Fi
D)Bluetooth
سؤال
Which of the following is not true about the Net Neutrality debate?

A)ISPs need a financially sustainable way to pay for the costs of network expansion and upgrades so that the Internet can meet the growing needs of the people and organizations that use it.
B)A two-tiered system would make things more difficult for new,innovative businesses that lack the financial resources to pay for access to premium service levels.
C)The FCC's 2010 ruling allows ISPs to charge companies for faster data transmission - but does not allow ISPs to outright block content.
D)Almost all business organizations favor a two-tiered system whereas most individual users favor Net Neutrality.
سؤال
___________ is an umbrella term that applies to location-aware technologies that allow devices to communicate securely with each other over short distances.

A)GPS technology
B)Location sensitive apps
C)Geo-location technology
D)Near-field communications
سؤال
Which of the following is not a function of network protocols?

A)Send data to the correct recipient(s)
B)Physically transmit data
C)Determine encryption algorithm and convert message
D)Receive messages and send responses to the correct recipient
سؤال
___________ is the practice of managing data transfer to ensure a certain level of performance or QoS.

A)Data filtering
B)Packet filtering
C)Circuit switching
D)Traffic shaping
سؤال
The 4G networks are faster than 3G because 4G are all ____________ networks.

A)mobile
B)digital or IP
C)packet switched
D)wireless
سؤال
IT developers use ________ to quickly and easily connect diverse data and services to each other and as gateways to popular apps such as Twitter,Facebook,and Amazon.

A)Mobile OS
B)APIs
C)SQL
D)SlashDB
سؤال
Which of the following statements best represents the position of people who are in favor of Net Neutrality?

A)The Internet should be free for everyone.
B)ISPs should treat all sources of data equally and not give priority to content providers who pay for faster transmission.
C)Providers of VoIP,video or other bandwidth intensive services should pay more to ISPs to carry their content because they use a disproportionate amount of network resources.
D)Users of video or similar bandwidth intensive services should pay more to ISPs for this content because they use a disproportionate amount of network resources.
سؤال
_____________ is a location-aware system that transmits the identity (in the form of a unique serial number)of an object or person using radio waves.It is used to track items in a supply chain or equipment in a production facility.

A)RFID
B)GIS
C)LTE
D)GSM
سؤال
____________is the basic communication protocol of the Internet.This protocol is supported by every major network operating system (OS)to ensure that all devices on the Internet can communicate.

A)HTML
B)HTTP
C)TCP/IP
D)FTP
سؤال
Mobile device apps that enable users to pay for things or check-in to hotels or venues use _________ technology.

A)GPS
B)GIS
C)TCP/IP
D)NFC
سؤال
Which of these location-aware technologies is the most secure?

A)NFC
B)WiFi
C)Bluetooth
D)WiMAX
سؤال
Amazon has enhanced its voice-automated Alexa with a new standard API called __________which increases the efficiency of the list feature.

A)Personal Lister
B)Voice Activator
C)List Skills
D)Catalog Expander
سؤال
To reduce product development time,Caterpillar connected its engineering and manufacturing divisions with its active suppliers,distributors,overseas factories,and customers,through ________.

A)An extranet
B)An intranet
C)A Transportation Business Center
D)A third-party,value-added network
سؤال
In basic terms,the IoT means that you can connect any device that has a(n)______ to the Internet or to each other.

A)computer chip
B)RFID tag
C)wireless card
D)on/off switch
سؤال
Dr.Garcia is a business professor at a large state college.At the start of each workday,he opens a Web browser on his office computer and accesses the university's Web site.From there,he logs into his institution's "MyCollege" portal with his username and password.From the portal he can access his email,Web pages for each of his courses,and confidential information about the students he advises.Most likely,Dr.Garcia is using what kind of network when using the portal?

A)Extranet
B)Intranet
C)Socialnet
D)Virtual Private Network (VPN
سؤال
When Julie Smith wants to find information on the Internet,she uses the Google search engine.But when she wants to find a document or data set created by her company for internal purposes only,she logs into the company ________.

A)VPN
B)Intranet
C)Cloud
D)Extranet
سؤال
Efficient Auto Parts is a wholesale distributor.They purchase auto parts in bulk from manufacturers and sell in smaller quantities to regional retail outlets.They understand that carrying excess inventory can be expensive.On the other hand,running out of inventory can lead to lost business.Therefore,they have created a network that their suppliers can log into to check inventory levels for the parts they sell.When inventory levels reach an agreed upon level,the supplier automatically sends more to the distributor,with all the documentation being handled electronically.This system is most likely part of what kind of network?

A)Intranet
B)Extranet
C)VPN
D)Socialnet
سؤال
Unilever's web-based database,the Transportation Business Center (TBC),provides its 30 contract carriers with site specification requirements about pick-up and delivery locations.The TBC contains information such as contact names and phone numbers,operating hours,the number of dock doors at a location,the height of the dock doors,how to make an appointment to deliver or pick up shipments,pallet configuration,and other special requirements.Unilever's practice of providing this kind of information over a network with its carriers is an example of:

A)Enterprise use of Intranets
B)Brainstorming
C)Virtual collaboration
D)Enterprise search
سؤال
When security issues are a special concern,companies want to take extra steps to make sure that transmissions can't be intercepted or compromised.In these situations they will use a network that encrypts the packets before they are transferred over the network.This solution is called a(n)___________________.

A)Intranet
B)Extranet
C)Virtual Private Network (VPN)
D)SecureNet
سؤال
According to your text,developing software for wireless devices had been challenging because ________________.

A)Until recently,the market was not large enough to justify large scale investment in the development of software apps.
B)Restrictions imposed by 2 or 3 dominate hardware manufacturers
C)There has not been a widely accepted standard for wireless devices.
D)Wireless devices are significantly more complex than traditional computing devices.
سؤال
The connection of two Bluetooth devices is called:

A)pairing
B)collaboration
C)activation
D)mashup
سؤال
The source of IoT data is the _________.

A)computer chip
B)sensors
C)broadband connection
D)Bluetooth
سؤال
A(n)_______________ is a private,company-owned network that can be logged into remotely via the Internet.Typical users are suppliers,vendors,partners,or customers.

A)Intranet
B)Extranet
C)Virtual Private Network (VPN
D)Socialnet
سؤال
The standard way computers connect to a wireless network is called:

A)Bluetooth
B)WiFi
C)5G
D)Pairing
سؤال
Group activities devoted to idea generation can be hindered when members of the group are geographically dispersed,have conflicting schedules or any other reasons that prevents the group from meeting face to face.An effective solution to these problems is ____________.

A)Sharing ideas by email
B)Cloud brainstorming apps such as Evernote and iMindmap Online
C)Posting ideas to social media sites such as YouTube,Pinterest or Twitter
D)Forming workgroups with people that work in the same location or have compatible schedules.
سؤال
Different CPUs,operating systems,storage media,and mobile platform environments characterize the mobile device marketplace.This creates significant challenges for:

A)Mobile device retailers
B)Mobile software developers
C)Government regulators
D)Strategic Planners
سؤال
The success or failure of group work depends on a set of factors and processes known as _______________.

A)Team work
B)Key Performance Indicators (KPIs)
C)Group dynamics
D)Effective leadership
سؤال
A(n)____________ is a widely used type of network based on Internet technology (e.g.browsers,Internet protocols,etc. )but focused on serving the internal informational needs of a company.

A)Intranet
B)Extranet
C)Virtual Private Network (VPN
D)Socialnet
سؤال
How does a virtual private network (VPN)provide additional security over other types of networks?

A)It requires a username and password for access.
B)It encrypts data packets prior to transmission.
C)Users are required to answer a set of "challenge questions" prior to being given access.
D)Users are required to pass a retinal scan,finger print scan or some other high level security test before they can access the network.
سؤال
Wal-Mart provides P&G access to sales information on every item Wal-Mart buys from P&G.The information is collected by P&G on a daily basis from every Wal-Mart store,and P&G uses the information to manage the inventory replenishment for Wal-Mart.This is an example of:

A)Virtual collaboration
B)Enterprise use of Intranets
C)VoIP technologies
D)Enterprise social media
سؤال
Circuit switching involves a dedicated connection between a source and a destination,such as when a voice call is placed between two landline telephones.
سؤال
Voice over IP (VoIP)networks carry voice calls by converting voice (analog signals)to digital signals that are sent as packets.
سؤال
IPv4 addresses have 4 groups of four alphanumeric characters,which allow for 2^32 or roughly 4.3 billion unique IP addresses.
سؤال
Broadband is the capacity,or throughput per second of a network.
سؤال
A router acts as a controller,enabling networked devices to talk to each other efficiently.
سؤال
Five basic functions of business networks are communication,mobility,collaboration,relationships,and search.
سؤال
An API provides a standard way for different things,such as software,content,or websites,to talk to each other in a way that they both understand,but it requires extensive programming.
سؤال
Each device attached to a network has a unique IP address that enables it to send and receive files.
سؤال
Very large data transfers over broadband networks do not reduce the bandwidth availability for others on the network.
سؤال
A broadband network is one with high capacity or bandwidth.
سؤال
In April 2014,ARIN reported that IPv4 addresses were running out,and therefore enterprises needed to re-use or duplicate their IP addresses.
سؤال
Network traffic is shaped by delaying the flow of less important network traffic,such as bulk data transfers,P2P file-sharing programs,and BitTorrent traffic.
سؤال
Which of the following is not considered by organizations to be an advantage of using IoT?

A)Ability to monitor performance,quality and reliability of products and services
B)Gaining insight into new products and services
C)Security of networks and data gathered
D)Remote troubleshooting of products
سؤال
The City of Santander,Spain monitors many aspects of city life through the transmissions of _________ embedded throughout the city.

A)fiber optic cable
B)sensors
C)Bluetooth
D)VPNs
سؤال
5G will offer huge gains in both speed and capacity over existing 4G networks-along with opportunities at the operations and strategic levels.
سؤال
Network capacity is measured in terms of its throughput,or bandwidth
سؤال
The higher the required QoS,the less expensive the technologies needed to manage organizational networks.
سؤال
Files are broken down into blocks known as protocols in order to be transmitted over a network to their destination.
سؤال
IPv6 addresses have 6 groups of alphanumeric characters,which allow for 2^106 addresses.
سؤال
Applications for voice conversations and video streaming typically perform poorly on broadband networks.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/135
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Networks, Collaborative Technology, and the Internet of Things
1
In terms of digital transmissions,_______ transfers data in small blocks based on the destination IP address.

A)Chunking
B)Circuit switching
C)Packet switching
D)IP Streaming
C
2
Network capacity is measured in terms of its ________.

A)Protocol
B)Size
C)IP version
D)Bandwidth
D
3
________ is the method by which data are sent from one device to another via a network.

A)API
B)5G
C)Bandwidth
D)IP
D
4
Bandwidth-intensive apps are important to business processes,but they also strain network capabilities and resources.One strategy for regulating a network's quality or service is to "prioritize traffic" which means:

A)Allocating network resources to users based on seniority in the organization
B)Data and apps that are sensitive to time-delay are given priority on the network
C)Giving priority to mobile transmissions to avoid bottlenecks
D)Restricting traffic from voice and video apps that disproportionally use network bandwidth to times when demand for network resources is low
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
5
Sony realized that the technical limitations of____ were making it urgent to move to ________.

A)64-bit addresses;128-bit version
B)IPv4addresses;IPv6
C)IP addresses;mobile networks
D)3G addresses;4Gor 5G networks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
6
Every device that communicates with a network must have a unique identifying ________

A)API
B)IP address
C)protocol
D)VoIP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
7
In terms of network capacity,a pipeline analogy is often used.The larger the diameter of the pipe,the greater the throughput (volume)of water that flows through it and the faster water is being transferred through it.This analogy refers to a network's ___________.

A)Packet router
B)Transmission protocols
C)Connectivity
D)Bandwidth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following decides how the digital 1's and 0's are represented in terms of voltage and frequencies?

A)Signal frequency spectrum
B)Bandwidth
C)Switches and routers
D)Modulation and coding
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
9
Network ________ are devices that transmit ________from their source to their destination based on IP addresses.

A)switches and routers: data packets
B)APIs;data packets
C)routers;digital signals
D)firewalls;digital signals
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
10
With _________,voice and data transmissions travel in packets over telephone wires.

A)VoIP
B)MP3 or MP4
C)TCP/IP
D)Wi-Fi
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
11
To insure QoS of a network,an alternative to "prioritizing traffic" is to __________,which means holding back traffic from non-time sensitive apps so that apps like voice and video run more effectively.

A)Throttle traffic
B)Block traffic
C)Re-direct traffic
D)Filter traffic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
12
Basic functions of business networks are all of the following except _______.

A)Search
B)Mobility
C)Collaboration
D)Routers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following about IPv4 is false?

A)It has been Internet protocol for over three decades.
B)It is easy to configure and to change ISP.
C)It has reached the limits of its design.
D)It is being replaced with IPv6.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
14
_________ networks are high capacity digital networks.

A)Circuit
B)Narrowband
C)Broadband
D)Smart grid
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
15
An important management decision concerns the network's _________ especially for delay-sensitive data such as real-time voice and high-quality video.

A)Size and Scope
B)Availability and number of access points
C)Mobility
D)Quality of service (QoS)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
16
Investments in data networks,IP addresses,routers,and switches are ________ because of their impact on productivity,security,user experiences,and customer service.

A)telecommunication basics
B)tactical issues
C)technology decisions
D)business decisions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
17
All generations of networks are based on ________.

A)switching
B)wireless
C)The cloud
D)circuits
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
18
____________ is older technology for transmitting signals that originated with telephone calls;and is inefficient for digital transmission.

A)Chunking
B)Circuit switching
C)Packet switching
D)IP Streaming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
19
_____________ are the rules and standards that govern how devices on a network exchange data and talk to each other.

A)Security settings
B)Organization's IT policies
C)Network protocols
D)Traffic priority procedures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following is not one of the basic functions of business networks?

A)Relationships
B)Strategic Planning
C)Search
D)Communication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
21
Enterprises are moving away from ad hoc adoption of mobile devices and network infrastructure to a more strategic planning build-out of their mobile capabilities.Factors to be considered when planning the build out include all of the following except ________.

A)Demands of multi-tasking mobile devices on the network
B)Impact of mobile technology on organizational culture
C)More robust mobile OSs
D)Mobile applications
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
22
After Ford Motor Company began relying on UPS Logistics Group's data networks to track millions of cars and trucks and to analyze any potential problems before they occurred,Ford realized a ________ reduction in vehicle inventory.

A)$1 million
B)$5 million
C)$1 billion
D)$5 billion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
23
Cable or DSL Internet connections are referred to as __________ broadband.

A)Mobile
B)Fixed-line
C)3G mobile
D)4G mobile
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following represents the primary perspective of people who oppose Net Neutrality?

A)They are concerned about a growing risk to privacy and ability to transmit data securely over the Internet.
B)They argue that there have always been different levels of Internet service and that a two-tiered system would enable more freedom of choice and promote e-commerce.
C)They are concerned that the government is not doing enough to properly regulate the Internet.
D)They are concerned about the growth of traffic shaping because it has the potential to slow transmission of certain types of data or content.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
25
In most organizations today,when the network goes down,it causes ___________.

A)Little or no disruption
B)Minor disruption of productivity or service
C)Significant disruption of productivity or service
D)Almost complete disruption of productivity or service,including lost sales,financial consequences and inability to process payroll and inventory.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
26
Mobile infrastructure consists of the integration of all of the following factors except ________.

A)Devices
B)Support
C)Security measures
D)Personnel
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which of the following statements represents the primary concerns of people who are in favor of Net Neutrality?

A)They fear that ISPs will be able to block content representing controversial points of view or that access to high speed Internet transmission will be restricted to content providers who can pay for faster transmission.
B)They are concerned that ISPs will become over-regulated by government agencies.
C)They are concerned that ISPs will lose the ability to properly fund network expansion to accommodate the growing need for bandwidth intensive services.
D)They are concerned about growing risks to privacy and the ability to transmit data securely over the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which of the following trends or transformations was not forecast in Cisco's most recent Visual Networking Index Forecast (VNI)?

A)Smartphones will reach 81% of mobile data traffic by 2020.
B)Number of mobile-connected devices will exceed the world's population.
C)A lot of traffic will be offloaded from cellular networks and onto public Wi-Fi networks.
D)80% of these new smartphone users will be located in Asia Pacific,the Middle East and Africa.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
29
Mobile networks and infrastructure have the potential to reduce healthcare costs.Tracking medical equipment and hospital inventory,such as gurneys,are done with _________ at a number of hospitals.

A)API
B)GPS
C)RFID tagging
D)Linux
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
30
Networking standards "802.11b","802.11a",and "802.11g" are different types of _____________ standards.

A)MIMO
B)DSL
C)Wi-Fi
D)Bluetooth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following is not true about the Net Neutrality debate?

A)ISPs need a financially sustainable way to pay for the costs of network expansion and upgrades so that the Internet can meet the growing needs of the people and organizations that use it.
B)A two-tiered system would make things more difficult for new,innovative businesses that lack the financial resources to pay for access to premium service levels.
C)The FCC's 2010 ruling allows ISPs to charge companies for faster data transmission - but does not allow ISPs to outright block content.
D)Almost all business organizations favor a two-tiered system whereas most individual users favor Net Neutrality.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
32
___________ is an umbrella term that applies to location-aware technologies that allow devices to communicate securely with each other over short distances.

A)GPS technology
B)Location sensitive apps
C)Geo-location technology
D)Near-field communications
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which of the following is not a function of network protocols?

A)Send data to the correct recipient(s)
B)Physically transmit data
C)Determine encryption algorithm and convert message
D)Receive messages and send responses to the correct recipient
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
34
___________ is the practice of managing data transfer to ensure a certain level of performance or QoS.

A)Data filtering
B)Packet filtering
C)Circuit switching
D)Traffic shaping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
35
The 4G networks are faster than 3G because 4G are all ____________ networks.

A)mobile
B)digital or IP
C)packet switched
D)wireless
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
36
IT developers use ________ to quickly and easily connect diverse data and services to each other and as gateways to popular apps such as Twitter,Facebook,and Amazon.

A)Mobile OS
B)APIs
C)SQL
D)SlashDB
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following statements best represents the position of people who are in favor of Net Neutrality?

A)The Internet should be free for everyone.
B)ISPs should treat all sources of data equally and not give priority to content providers who pay for faster transmission.
C)Providers of VoIP,video or other bandwidth intensive services should pay more to ISPs to carry their content because they use a disproportionate amount of network resources.
D)Users of video or similar bandwidth intensive services should pay more to ISPs for this content because they use a disproportionate amount of network resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
38
_____________ is a location-aware system that transmits the identity (in the form of a unique serial number)of an object or person using radio waves.It is used to track items in a supply chain or equipment in a production facility.

A)RFID
B)GIS
C)LTE
D)GSM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
39
____________is the basic communication protocol of the Internet.This protocol is supported by every major network operating system (OS)to ensure that all devices on the Internet can communicate.

A)HTML
B)HTTP
C)TCP/IP
D)FTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
40
Mobile device apps that enable users to pay for things or check-in to hotels or venues use _________ technology.

A)GPS
B)GIS
C)TCP/IP
D)NFC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
41
Which of these location-aware technologies is the most secure?

A)NFC
B)WiFi
C)Bluetooth
D)WiMAX
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
42
Amazon has enhanced its voice-automated Alexa with a new standard API called __________which increases the efficiency of the list feature.

A)Personal Lister
B)Voice Activator
C)List Skills
D)Catalog Expander
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
43
To reduce product development time,Caterpillar connected its engineering and manufacturing divisions with its active suppliers,distributors,overseas factories,and customers,through ________.

A)An extranet
B)An intranet
C)A Transportation Business Center
D)A third-party,value-added network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
44
In basic terms,the IoT means that you can connect any device that has a(n)______ to the Internet or to each other.

A)computer chip
B)RFID tag
C)wireless card
D)on/off switch
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
45
Dr.Garcia is a business professor at a large state college.At the start of each workday,he opens a Web browser on his office computer and accesses the university's Web site.From there,he logs into his institution's "MyCollege" portal with his username and password.From the portal he can access his email,Web pages for each of his courses,and confidential information about the students he advises.Most likely,Dr.Garcia is using what kind of network when using the portal?

A)Extranet
B)Intranet
C)Socialnet
D)Virtual Private Network (VPN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
46
When Julie Smith wants to find information on the Internet,she uses the Google search engine.But when she wants to find a document or data set created by her company for internal purposes only,she logs into the company ________.

A)VPN
B)Intranet
C)Cloud
D)Extranet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
47
Efficient Auto Parts is a wholesale distributor.They purchase auto parts in bulk from manufacturers and sell in smaller quantities to regional retail outlets.They understand that carrying excess inventory can be expensive.On the other hand,running out of inventory can lead to lost business.Therefore,they have created a network that their suppliers can log into to check inventory levels for the parts they sell.When inventory levels reach an agreed upon level,the supplier automatically sends more to the distributor,with all the documentation being handled electronically.This system is most likely part of what kind of network?

A)Intranet
B)Extranet
C)VPN
D)Socialnet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
48
Unilever's web-based database,the Transportation Business Center (TBC),provides its 30 contract carriers with site specification requirements about pick-up and delivery locations.The TBC contains information such as contact names and phone numbers,operating hours,the number of dock doors at a location,the height of the dock doors,how to make an appointment to deliver or pick up shipments,pallet configuration,and other special requirements.Unilever's practice of providing this kind of information over a network with its carriers is an example of:

A)Enterprise use of Intranets
B)Brainstorming
C)Virtual collaboration
D)Enterprise search
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
49
When security issues are a special concern,companies want to take extra steps to make sure that transmissions can't be intercepted or compromised.In these situations they will use a network that encrypts the packets before they are transferred over the network.This solution is called a(n)___________________.

A)Intranet
B)Extranet
C)Virtual Private Network (VPN)
D)SecureNet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
50
According to your text,developing software for wireless devices had been challenging because ________________.

A)Until recently,the market was not large enough to justify large scale investment in the development of software apps.
B)Restrictions imposed by 2 or 3 dominate hardware manufacturers
C)There has not been a widely accepted standard for wireless devices.
D)Wireless devices are significantly more complex than traditional computing devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
51
The connection of two Bluetooth devices is called:

A)pairing
B)collaboration
C)activation
D)mashup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
52
The source of IoT data is the _________.

A)computer chip
B)sensors
C)broadband connection
D)Bluetooth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
53
A(n)_______________ is a private,company-owned network that can be logged into remotely via the Internet.Typical users are suppliers,vendors,partners,or customers.

A)Intranet
B)Extranet
C)Virtual Private Network (VPN
D)Socialnet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
54
The standard way computers connect to a wireless network is called:

A)Bluetooth
B)WiFi
C)5G
D)Pairing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
55
Group activities devoted to idea generation can be hindered when members of the group are geographically dispersed,have conflicting schedules or any other reasons that prevents the group from meeting face to face.An effective solution to these problems is ____________.

A)Sharing ideas by email
B)Cloud brainstorming apps such as Evernote and iMindmap Online
C)Posting ideas to social media sites such as YouTube,Pinterest or Twitter
D)Forming workgroups with people that work in the same location or have compatible schedules.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
56
Different CPUs,operating systems,storage media,and mobile platform environments characterize the mobile device marketplace.This creates significant challenges for:

A)Mobile device retailers
B)Mobile software developers
C)Government regulators
D)Strategic Planners
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
57
The success or failure of group work depends on a set of factors and processes known as _______________.

A)Team work
B)Key Performance Indicators (KPIs)
C)Group dynamics
D)Effective leadership
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
58
A(n)____________ is a widely used type of network based on Internet technology (e.g.browsers,Internet protocols,etc. )but focused on serving the internal informational needs of a company.

A)Intranet
B)Extranet
C)Virtual Private Network (VPN
D)Socialnet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
59
How does a virtual private network (VPN)provide additional security over other types of networks?

A)It requires a username and password for access.
B)It encrypts data packets prior to transmission.
C)Users are required to answer a set of "challenge questions" prior to being given access.
D)Users are required to pass a retinal scan,finger print scan or some other high level security test before they can access the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
60
Wal-Mart provides P&G access to sales information on every item Wal-Mart buys from P&G.The information is collected by P&G on a daily basis from every Wal-Mart store,and P&G uses the information to manage the inventory replenishment for Wal-Mart.This is an example of:

A)Virtual collaboration
B)Enterprise use of Intranets
C)VoIP technologies
D)Enterprise social media
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
61
Circuit switching involves a dedicated connection between a source and a destination,such as when a voice call is placed between two landline telephones.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
62
Voice over IP (VoIP)networks carry voice calls by converting voice (analog signals)to digital signals that are sent as packets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
63
IPv4 addresses have 4 groups of four alphanumeric characters,which allow for 2^32 or roughly 4.3 billion unique IP addresses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
64
Broadband is the capacity,or throughput per second of a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
65
A router acts as a controller,enabling networked devices to talk to each other efficiently.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
66
Five basic functions of business networks are communication,mobility,collaboration,relationships,and search.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
67
An API provides a standard way for different things,such as software,content,or websites,to talk to each other in a way that they both understand,but it requires extensive programming.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
68
Each device attached to a network has a unique IP address that enables it to send and receive files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
69
Very large data transfers over broadband networks do not reduce the bandwidth availability for others on the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
70
A broadband network is one with high capacity or bandwidth.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
71
In April 2014,ARIN reported that IPv4 addresses were running out,and therefore enterprises needed to re-use or duplicate their IP addresses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
72
Network traffic is shaped by delaying the flow of less important network traffic,such as bulk data transfers,P2P file-sharing programs,and BitTorrent traffic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
73
Which of the following is not considered by organizations to be an advantage of using IoT?

A)Ability to monitor performance,quality and reliability of products and services
B)Gaining insight into new products and services
C)Security of networks and data gathered
D)Remote troubleshooting of products
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
74
The City of Santander,Spain monitors many aspects of city life through the transmissions of _________ embedded throughout the city.

A)fiber optic cable
B)sensors
C)Bluetooth
D)VPNs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
75
5G will offer huge gains in both speed and capacity over existing 4G networks-along with opportunities at the operations and strategic levels.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
76
Network capacity is measured in terms of its throughput,or bandwidth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
77
The higher the required QoS,the less expensive the technologies needed to manage organizational networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
78
Files are broken down into blocks known as protocols in order to be transmitted over a network to their destination.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
79
IPv6 addresses have 6 groups of alphanumeric characters,which allow for 2^106 addresses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
80
Applications for voice conversations and video streaming typically perform poorly on broadband networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 135 في هذه المجموعة.