Deck 7: Networks: Mobile Business

ملء الشاشة (f)
exit full mode
سؤال
The packet footer represents the end of the packet or transmission end.The packet header and packet footer contain error-checking information to ensure the entire message is sent and received.The receiving device reassembles the individual packets into the original by stripping off the headers and footers and then piecing together the packets in the correct sequence.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A local area network (LAN)connects a group of computers in close proximity,such as in an office building,school,or home.LANs allow sharing of files,printers,games,and other resources.A LAN also often connects to other LANs,and to wide area networks.
سؤال
Traceroute formats include a packet header,packet body containing the original message,and packet footer.
سؤال
A domain name system (DNS)converts IP addresses into domains,or identifying labels that use a variety of recognizable naming conventions.
سؤال
The packet header lists the destination (for example in IP packets the destination is the IP address)along with the length of the message data.
سؤال
Attenuation is a single unit of binary data routed through a network.
سؤال
IP address is a unique number that identifies where computers are located on the network.
سؤال
Dynamic Host Configuration Protocol (DHCP)allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network.
سؤال
Packets directly impact network performance and reliability by subdividing an electronic message into smaller more manageable packets.
سؤال
A local area network (LAN)spans a large geographic area such as a state,province,or country.
سؤال
Dynamic host configuration protocol is a utility application that monitors the network path of packet data sent to a remote computer.
سؤال
A wide area network (WAN)spans a large geographic area such as a state,province,or country.Perhaps the best example is the Internet.
سؤال
Network convergence is the integration of communication channels into a single service.
سؤال
A repeater represents the loss of a network signal strength measured in decibels (dB)and occurs because the transmissions gradually dissipate in strength over longer distances or radio interference or physical obstructions like walls also impact communication signals.
سؤال
A metropolitan area network (MAN)is a large computer network usually spanning a city.
سؤال
Telecommuting (virtual workforce)allows users to work from remote locations such as home or hotel using high-speed Internet to access business applications and data.
سؤال
A repeater receives and repeats a signal extending its attenuation or range.
سؤال
IP address is a simple network protocol that allows the transfer of files between two computers on the Internet.
سؤال
National service providers (NSPs),private companies that own and maintain the worldwide backbone that supports the Internet.These include Sprint,Verizon,MCI (previously UUNet/WorldCom),AT&T,NTT,Level3,Century Link,and Cable & Wireless Worldwide.
سؤال
Broadband over power line (BPL)technology makes possible high-speed Internet access over ordinary residential electrical lines and offers an alternative to DSL or high-speed cable modems.
سؤال
RFID innovations and technologies are being used in many industries including retail,hospitals,pharmaceuticals,and ranchers.
سؤال
The three main benefits of networks or a connected world include sharing resources,providing opportunities,and reducing travel.
سؤال
Passive RFID tags have their own transmitter and a power source (typically a battery).
سؤال
A proxy is software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons.
سؤال
Worldwide Interoperability for Microwave Access (WiMAX)is a communications technology aimed at providing high-speed wireless data over metropolitan area networks.
سؤال
Two methods for encrypting network traffic on the Web are secure sockets layer and secure hypertext transfer protocol.
سؤال
A wireless LAN (WLAN)is a means by which portable devices can connect wirelessly to a local area network,using access points that send and receive data via radio waves.
سؤال
The main challenges facing networks include security,social,ethical and political issues.
سؤال
Some of the social challenges with networking occur with newsgroups or blogs where like-minded people can exchange messages.Problems can arise when sensitive social issues become the topic of discussion such as politics or religion.
سؤال
A great GIS example,Google earth,combines satellite imagery,geographic data,and Google's search capabilities to create a virtual globe that users can download to a computer or mobile device.
سؤال
A global positioning system (GPS)consists of hardware,software,and data that provide location information for display on a multidimensional map.
سؤال
Wireless networking includes personal area networks (PAN)that provide communication over a short distance that is intended for use with devices that are owned and operated by a single user.
سؤال
Radio-frequency identification (RFID)uses electronic tags and labels to identify objects wirelessly over short distances.
سؤال
VPNs are often used to connect to a corporate server.VPN stands for a Valued Partner Network.
سؤال
Passive RFID tags do not have a power source.
سؤال
An intranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing,communications,collaboration,Web publishing,and the support of business processes.
سؤال
The Institute of Electrical and Electronics Engineers (IEEE)is an organization that researches and institutes electrical standards for communication and other technologies.Known officially as IEEE 802.11n (or wireless-N)is the newest standard for wireless networking.Compared with earlier standards like 802.11b,wireless-N offers faster speeds,more flexibility and greater range.
سؤال
Mobile and wireless networks are identical and the terms can be used synonymously.
سؤال
GPS utilizes location-based services (LBS),applications that use location information to provide a service,whereas a GIS does not use LBS applications.
سؤال
Secure sockets layer (SSL)is a combination of HTTP and SSL to provide encryption and secure identification of an Internet server.
سؤال
RFID accelerometer is a device that measures the acceleration (the rate of change of velocity)of an item and is used to track truck speeds or taxi cab speeds.
سؤال
RFID tag is an electronic identification device that is made up of a chip and antenna.
سؤال
RFID reader (RFID interrogator)is a transmitter/receiver that reads the contents of RFID tags in the area.A RFID system is comprised of one or more RFID tags,one or more RFID readers,two or more antennas.
سؤال
Estimated-time-enroute (ETE)is the time remaining before reaching a destination using the present speed and is typically used for navigation applications.
سؤال
Active RFID tags do not depend on a silicon microchip and use plastic or conductive polymers instead of silicon-based microchips allowing them to be washed or exposed to water without damaging the chip.
سؤال
Wireless networks offer many business advantages but can often slow employee productivity and workflow processes.
سؤال
Active RFID tags use a battery to run the microchip's circuitry,but communicate by drawing power from the RFID reader.
سؤال
Automatic vehicle location (AVL)uses GPS tracking to track vehicles.
سؤال
Estimated-time-of-arrival (ETA)is the time of day of an expected arrival at a certain destination and is typically used for navigation applications.
سؤال
Longitude represents a north/south measurement of position.
سؤال
Spatial data (geospatial data or geographic information)identifies the geographic location of features and boundaries on Earth,such as natural or constructed features,oceans,and more.Spatial data can be mapped and is stored as coordinates and topology.A GIS accesses,manipulates,and analyzes spatial data.
سؤال
GIS map automation links business assets to a centralized system where they can be tracked and monitored over time.
سؤال
Cartography is the science and art of making an illustrated map or chart.GIS allows users to interpret,analyze,and visualize data in different ways that reveal patterns and trends in the form of reports,charts,and maps.
سؤال
Asset tracking occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items location with little or no manual intervention.
سؤال
WiMAX is a coding process that takes a digital map feature and assigns it an attribute that serves as a unique ID (tract number,node number)or classification (soil type,zoning category).GIS professionals are certified in geocoding practices to ensure industry standards are met when classifying spatial data.
سؤال
Geocache is a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find.GPS users find the geocache and typically sign a guest book or take an item and leave an item for the next adventure players to find.Caches are often placed in locations that are interesting or challenging for people to discover.
سؤال
Geographic information system (GIS)stores,views,and analyzes geographic data creating multidimensional charts or maps.For example,GIS are monitoring global warming by measuring the speed of glaciers melting in Canada,Greenland,and Antarctica.
سؤال
Latitude represents an east/west measurement of position.
سؤال
Traceroute occurs when paper maps are laid edge-to-edge and items that run across maps do not match are reconfigured to match.
سؤال
A geocoin,a round coin-sized object,is uniquely numbered and hidden in geocache.Geocoins can also be shaped to match a theme like the state of Colorado or a birthday party hat.Geocoins are often decorative or commemorative,making them collectible and highly valuable for technology adventures.
سؤال
WLANs that use Wi-Fi have a built-in security mechanism called Wi-Fi Protected Access (WPA),a wireless security protocol to protect Wi-Fi networks.It is an improvement on the original Wi-Fi security standard,Wired Equivalent Privacy (WEP),and provides more sophisticated data encryption and user authentication.
سؤال
WLANs that use Wi-Fi have a built-in security mechanism called Wi-Fi protected access (WPA),a wireless security protocol to protect Wi-Fi networks.
سؤال
War chalking is deliberately searching for Wi-Fi signals while driving by in a vehicle.
سؤال
LBS differ from RFID in that an LBS cannot track and monitor objects such as inventory.
سؤال
LANs,WANs,and MANs all provide users with an accessible and reliable network infrastructure.Which of the below are the most important network differentiating dimensions?

A)Reliability and timing
B)Confidentiality and performance
C)Security and cost
D)Cost and performance
سؤال
One of the main challenges of business mobility is protecting against theft.
سؤال
Which of the following includes the three primary network types?

A)LAN,WAN,SAN
B)LAN,WAN,MAN
C)LAN,SAN,XAN
D)LAN,WAN,XAN
سؤال
Wired equivalent privacy (WEP)is an encryption algorithm designed to protect wireless transmission data.
سؤال
War driving is the practice of tagging pavement with codes displaying where Wi-Fi access is available.The codes for war driving tell other users the kind of access available,the speed of the network,and if the network is secured.
سؤال
What spans a large geographic area such as a state,province,or country,similar to the Internet?

A)Metropolitan area network (MAN)
B)Local area network (LAN)
C)Wide area network (WAN)
D)Secure area network (SAN)
سؤال
Wireless technology offers the opportunity to redesign and often complicates the work flow processes to be faster,yet more expensive,and more time-consuming.
سؤال
What are the five elements that are needed to create a connected world or a network?

A)Categories,programs,alternatives,people,and core philosophy
B)Program,providers,access,mechanics,and teachers
C)Categories,providers,access technologies,protocols,and convergence
D)LAN,WAN,MAN,PAN,and SAN
سؤال
With the power of a wireless network,business professionals can take advantage of mobility allowing them to work from anywhere,at any time,using many different devices.
سؤال
Enhancing mobility is one of the greatest advantages provided by wireless networks.It allows activities that were formerly tied to physical locations to be performed almost anywhere.
سؤال
What enables telecommunications or the exchange of information (voice,text,data,audio,and video)?

A)Computer networks
B)Email
C)HTML
D)Technology sourcing
سؤال
What is a large computer network usually spanning a city or a specific infrastructure like a college known as?

A)Metropolitan area network (MAN)
B)Local area network (LAN)
C)Wide area network (WAN)
D)Secure area network (SAN)
سؤال
What connects a group of computers in close proximity,such as in a school or office setting?

A)Metropolitan area network (MAN)
B)Local area network (LAN)
C)Wide area network (WAN)
D)Secure area network (SAN)
سؤال
Instant access to customer profiles,account history,and current order status significantly improves the quality of interactions with customers,suppliers,and business partners.
سؤال
What services do telecommunications offer?

A)Telephone and cellular services
B)Cable and satellite services
C)Internet services
D)All of the above
سؤال
What is the largest and most important network that has evolved into a global information superhighway?

A)Internet
B)Intranet
C)Extranet
D)LAN
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/268
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Networks: Mobile Business
1
The packet footer represents the end of the packet or transmission end.The packet header and packet footer contain error-checking information to ensure the entire message is sent and received.The receiving device reassembles the individual packets into the original by stripping off the headers and footers and then piecing together the packets in the correct sequence.
True
Explanation: The packet footer represents the end of the packet or transmission end.The packet header and packet footer contain error-checking information to ensure the entire message is sent and received.The receiving device reassembles the individual packets into the original by stripping off the headers and footers and then piecing together the packets in the correct sequence.
2
A local area network (LAN)connects a group of computers in close proximity,such as in an office building,school,or home.LANs allow sharing of files,printers,games,and other resources.A LAN also often connects to other LANs,and to wide area networks.
True
Explanation: A local area network (LAN)connects a group of computers in close proximity,such as in an office building,school,or home.LANs allow sharing of files,printers,games,and other resources.A LAN also often connects to other LANs,and to wide area networks.
3
Traceroute formats include a packet header,packet body containing the original message,and packet footer.
False
Explanation: Standard packet formats include a packet header,packet body containing the original message,and packet footer.
4
A domain name system (DNS)converts IP addresses into domains,or identifying labels that use a variety of recognizable naming conventions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
5
The packet header lists the destination (for example in IP packets the destination is the IP address)along with the length of the message data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
6
Attenuation is a single unit of binary data routed through a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
7
IP address is a unique number that identifies where computers are located on the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
8
Dynamic Host Configuration Protocol (DHCP)allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
9
Packets directly impact network performance and reliability by subdividing an electronic message into smaller more manageable packets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
10
A local area network (LAN)spans a large geographic area such as a state,province,or country.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
11
Dynamic host configuration protocol is a utility application that monitors the network path of packet data sent to a remote computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
12
A wide area network (WAN)spans a large geographic area such as a state,province,or country.Perhaps the best example is the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
13
Network convergence is the integration of communication channels into a single service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
14
A repeater represents the loss of a network signal strength measured in decibels (dB)and occurs because the transmissions gradually dissipate in strength over longer distances or radio interference or physical obstructions like walls also impact communication signals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
15
A metropolitan area network (MAN)is a large computer network usually spanning a city.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
16
Telecommuting (virtual workforce)allows users to work from remote locations such as home or hotel using high-speed Internet to access business applications and data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
17
A repeater receives and repeats a signal extending its attenuation or range.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
18
IP address is a simple network protocol that allows the transfer of files between two computers on the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
19
National service providers (NSPs),private companies that own and maintain the worldwide backbone that supports the Internet.These include Sprint,Verizon,MCI (previously UUNet/WorldCom),AT&T,NTT,Level3,Century Link,and Cable & Wireless Worldwide.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
20
Broadband over power line (BPL)technology makes possible high-speed Internet access over ordinary residential electrical lines and offers an alternative to DSL or high-speed cable modems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
21
RFID innovations and technologies are being used in many industries including retail,hospitals,pharmaceuticals,and ranchers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
22
The three main benefits of networks or a connected world include sharing resources,providing opportunities,and reducing travel.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
23
Passive RFID tags have their own transmitter and a power source (typically a battery).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
24
A proxy is software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
25
Worldwide Interoperability for Microwave Access (WiMAX)is a communications technology aimed at providing high-speed wireless data over metropolitan area networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
26
Two methods for encrypting network traffic on the Web are secure sockets layer and secure hypertext transfer protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
27
A wireless LAN (WLAN)is a means by which portable devices can connect wirelessly to a local area network,using access points that send and receive data via radio waves.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
28
The main challenges facing networks include security,social,ethical and political issues.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
29
Some of the social challenges with networking occur with newsgroups or blogs where like-minded people can exchange messages.Problems can arise when sensitive social issues become the topic of discussion such as politics or religion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
30
A great GIS example,Google earth,combines satellite imagery,geographic data,and Google's search capabilities to create a virtual globe that users can download to a computer or mobile device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
31
A global positioning system (GPS)consists of hardware,software,and data that provide location information for display on a multidimensional map.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
32
Wireless networking includes personal area networks (PAN)that provide communication over a short distance that is intended for use with devices that are owned and operated by a single user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
33
Radio-frequency identification (RFID)uses electronic tags and labels to identify objects wirelessly over short distances.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
34
VPNs are often used to connect to a corporate server.VPN stands for a Valued Partner Network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
35
Passive RFID tags do not have a power source.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
36
An intranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing,communications,collaboration,Web publishing,and the support of business processes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
37
The Institute of Electrical and Electronics Engineers (IEEE)is an organization that researches and institutes electrical standards for communication and other technologies.Known officially as IEEE 802.11n (or wireless-N)is the newest standard for wireless networking.Compared with earlier standards like 802.11b,wireless-N offers faster speeds,more flexibility and greater range.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
38
Mobile and wireless networks are identical and the terms can be used synonymously.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
39
GPS utilizes location-based services (LBS),applications that use location information to provide a service,whereas a GIS does not use LBS applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
40
Secure sockets layer (SSL)is a combination of HTTP and SSL to provide encryption and secure identification of an Internet server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
41
RFID accelerometer is a device that measures the acceleration (the rate of change of velocity)of an item and is used to track truck speeds or taxi cab speeds.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
42
RFID tag is an electronic identification device that is made up of a chip and antenna.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
43
RFID reader (RFID interrogator)is a transmitter/receiver that reads the contents of RFID tags in the area.A RFID system is comprised of one or more RFID tags,one or more RFID readers,two or more antennas.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
44
Estimated-time-enroute (ETE)is the time remaining before reaching a destination using the present speed and is typically used for navigation applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
45
Active RFID tags do not depend on a silicon microchip and use plastic or conductive polymers instead of silicon-based microchips allowing them to be washed or exposed to water without damaging the chip.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
46
Wireless networks offer many business advantages but can often slow employee productivity and workflow processes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
47
Active RFID tags use a battery to run the microchip's circuitry,but communicate by drawing power from the RFID reader.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
48
Automatic vehicle location (AVL)uses GPS tracking to track vehicles.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
49
Estimated-time-of-arrival (ETA)is the time of day of an expected arrival at a certain destination and is typically used for navigation applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
50
Longitude represents a north/south measurement of position.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
51
Spatial data (geospatial data or geographic information)identifies the geographic location of features and boundaries on Earth,such as natural or constructed features,oceans,and more.Spatial data can be mapped and is stored as coordinates and topology.A GIS accesses,manipulates,and analyzes spatial data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
52
GIS map automation links business assets to a centralized system where they can be tracked and monitored over time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
53
Cartography is the science and art of making an illustrated map or chart.GIS allows users to interpret,analyze,and visualize data in different ways that reveal patterns and trends in the form of reports,charts,and maps.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
54
Asset tracking occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items location with little or no manual intervention.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
55
WiMAX is a coding process that takes a digital map feature and assigns it an attribute that serves as a unique ID (tract number,node number)or classification (soil type,zoning category).GIS professionals are certified in geocoding practices to ensure industry standards are met when classifying spatial data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
56
Geocache is a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find.GPS users find the geocache and typically sign a guest book or take an item and leave an item for the next adventure players to find.Caches are often placed in locations that are interesting or challenging for people to discover.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
57
Geographic information system (GIS)stores,views,and analyzes geographic data creating multidimensional charts or maps.For example,GIS are monitoring global warming by measuring the speed of glaciers melting in Canada,Greenland,and Antarctica.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
58
Latitude represents an east/west measurement of position.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
59
Traceroute occurs when paper maps are laid edge-to-edge and items that run across maps do not match are reconfigured to match.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
60
A geocoin,a round coin-sized object,is uniquely numbered and hidden in geocache.Geocoins can also be shaped to match a theme like the state of Colorado or a birthday party hat.Geocoins are often decorative or commemorative,making them collectible and highly valuable for technology adventures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
61
WLANs that use Wi-Fi have a built-in security mechanism called Wi-Fi Protected Access (WPA),a wireless security protocol to protect Wi-Fi networks.It is an improvement on the original Wi-Fi security standard,Wired Equivalent Privacy (WEP),and provides more sophisticated data encryption and user authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
62
WLANs that use Wi-Fi have a built-in security mechanism called Wi-Fi protected access (WPA),a wireless security protocol to protect Wi-Fi networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
63
War chalking is deliberately searching for Wi-Fi signals while driving by in a vehicle.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
64
LBS differ from RFID in that an LBS cannot track and monitor objects such as inventory.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
65
LANs,WANs,and MANs all provide users with an accessible and reliable network infrastructure.Which of the below are the most important network differentiating dimensions?

A)Reliability and timing
B)Confidentiality and performance
C)Security and cost
D)Cost and performance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
66
One of the main challenges of business mobility is protecting against theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
67
Which of the following includes the three primary network types?

A)LAN,WAN,SAN
B)LAN,WAN,MAN
C)LAN,SAN,XAN
D)LAN,WAN,XAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
68
Wired equivalent privacy (WEP)is an encryption algorithm designed to protect wireless transmission data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
69
War driving is the practice of tagging pavement with codes displaying where Wi-Fi access is available.The codes for war driving tell other users the kind of access available,the speed of the network,and if the network is secured.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
70
What spans a large geographic area such as a state,province,or country,similar to the Internet?

A)Metropolitan area network (MAN)
B)Local area network (LAN)
C)Wide area network (WAN)
D)Secure area network (SAN)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
71
Wireless technology offers the opportunity to redesign and often complicates the work flow processes to be faster,yet more expensive,and more time-consuming.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
72
What are the five elements that are needed to create a connected world or a network?

A)Categories,programs,alternatives,people,and core philosophy
B)Program,providers,access,mechanics,and teachers
C)Categories,providers,access technologies,protocols,and convergence
D)LAN,WAN,MAN,PAN,and SAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
73
With the power of a wireless network,business professionals can take advantage of mobility allowing them to work from anywhere,at any time,using many different devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
74
Enhancing mobility is one of the greatest advantages provided by wireless networks.It allows activities that were formerly tied to physical locations to be performed almost anywhere.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
75
What enables telecommunications or the exchange of information (voice,text,data,audio,and video)?

A)Computer networks
B)Email
C)HTML
D)Technology sourcing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
76
What is a large computer network usually spanning a city or a specific infrastructure like a college known as?

A)Metropolitan area network (MAN)
B)Local area network (LAN)
C)Wide area network (WAN)
D)Secure area network (SAN)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
77
What connects a group of computers in close proximity,such as in a school or office setting?

A)Metropolitan area network (MAN)
B)Local area network (LAN)
C)Wide area network (WAN)
D)Secure area network (SAN)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
78
Instant access to customer profiles,account history,and current order status significantly improves the quality of interactions with customers,suppliers,and business partners.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
79
What services do telecommunications offer?

A)Telephone and cellular services
B)Cable and satellite services
C)Internet services
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
80
What is the largest and most important network that has evolved into a global information superhighway?

A)Internet
B)Intranet
C)Extranet
D)LAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 268 في هذه المجموعة.