Deck 13: A Managers Guide to the Internet and Telecommunications
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/83
Play
Full screen (f)
Deck 13: A Managers Guide to the Internet and Telecommunications
1
Servers or organizations do not need to be housed within a country in order to use a country code as part of their domain name.
True
2
When the Internet really took off, much of the Internet's operating infrastructure was transitioned to be supported by government grants rather than private firms.
False
3
The address one types into a Web browser is also known as a:
A) universal redirection link.
B) uniform resource locator.
C) unique resource locator.
D) universal redirection locator.
E) uniform resource link.
A) universal redirection link.
B) uniform resource locator.
C) unique resource locator.
D) universal redirection locator.
E) uniform resource link.
B
4
Changing the letter case in host and domain names does not affect the user's ability to reach the destination.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following statements holds true for the term "html"?
A) It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.
B) It refers to the broadband service provided via light-transmitting fiber-optic cables.
C) It refers to the language used to compose Web pages.
D) It refers to a situation when separate ISPs link their networks to swap traffic on the Internet.
E) It refers to a system that connects end users to the Internet.
A) It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.
B) It refers to the broadband service provided via light-transmitting fiber-optic cables.
C) It refers to the language used to compose Web pages.
D) It refers to a situation when separate ISPs link their networks to swap traffic on the Internet.
E) It refers to a system that connects end users to the Internet.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
6
Popular sites like Google and Yahoo! have several computers assigned to their host names because:
A) they have operations in different countries.
B) they are registered under several generic top-level domain names.
C) of the disparity in the number of users accessing their sites in different parts of the world.
D) hoarding all information in one server increases the risk of damage in case of natural disasters.
E) it ensures that the load of requests to their sites do not overwhelm a single computer.
A) they have operations in different countries.
B) they are registered under several generic top-level domain names.
C) of the disparity in the number of users accessing their sites in different parts of the world.
D) hoarding all information in one server increases the risk of damage in case of natural disasters.
E) it ensures that the load of requests to their sites do not overwhelm a single computer.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
7
The Internet has no center and no one owns it.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
8
The http protocol is designed to be independent from the:
A) Web site's host name and domain name.
B) computer's Web browser and Web server.
C) Internet service provider and Web browser.
D) computer's hardware and operating system.
E) Web browser's domain name and mail server.
A) Web site's host name and domain name.
B) computer's Web browser and Web server.
C) Internet service provider and Web browser.
D) computer's hardware and operating system.
E) Web browser's domain name and mail server.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
9
IP addresses can be used to identify a user's physical location.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
10
One of the factors that accelerated the development of the Internet during the 1990s was:
A) the introduction of the personal computer into households.
B) the government's taking over of the Internet's operating structure from private players.
C) Intel's invention of low power processors used in portable computers.
D) the creation of the Windows and Mac OS operating systems.
E) the invention of graphical Web browsing.
A) the introduction of the personal computer into households.
B) the government's taking over of the Internet's operating structure from private players.
C) Intel's invention of low power processors used in portable computers.
D) the creation of the Windows and Mac OS operating systems.
E) the invention of graphical Web browsing.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
11
A Web address without a file name will load content from a default page.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
12
A device gets its IP address from whichever organization is currently connecting it to the Internet.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
13
Domain name registration is carried out on an auction basis to ensure the highest bidder gains rights to the desired domain name.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
14
A _____ enables communication by defining the format of data and rules for exchange.
A) nomenclature
B) regulation
C) protocol
D) dialect
E) convention
A) nomenclature
B) regulation
C) protocol
D) dialect
E) convention
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
15
In the URL, the host name is the name of the network a user tries to connect to.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
16
A firm that provides hardware and services to run Web sites of others is known as a(n) _____.
A) Web site incubator
B) Internet service provider
C) Web domain name registrar
D) Web hosting service
E) Internet Web host
A) Web site incubator
B) Internet service provider
C) Web domain name registrar
D) Web hosting service
E) Internet Web host
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
17
The language "http" is used to create and format Web pages.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
18
The hypertext transfer protocol (http) defines the communication between:
A) Web browsers and Web servers.
B) operating systems and Web browsers.
C) hardware and operating systems.
D) mail servers and hardware.
E) hardware and Web browsers.
A) Web browsers and Web servers.
B) operating systems and Web browsers.
C) hardware and operating systems.
D) mail servers and hardware.
E) hardware and Web browsers.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
19
One of the functions of domain name registrars is to:
A) set standards for administering domain names.
B) run a user's Web site on their Internet-connected servers for a fee.
C) assign domain names and corresponding IP addresses.
D) regulate the registration of IP addresses and host names.
E) resolve disputes between parties contesting for the same ISP.
A) set standards for administering domain names.
B) run a user's Web site on their Internet-connected servers for a fee.
C) assign domain names and corresponding IP addresses.
D) regulate the registration of IP addresses and host names.
E) resolve disputes between parties contesting for the same ISP.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
20
What protocol do most Web developers use to upload the Web pages, graphics, and other files for their Web sites?
A) HTTP
B) SMTP
C) FTP
D) SNMP
E) TCP
A) HTTP
B) SMTP
C) FTP
D) SNMP
E) TCP
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
21
The TCP works at both ends of Internet communication.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
22
Routers don't have perfect, end-to-end information on all points in the Internet.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
23
_____ is the language used to compose Web pages.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
24
The domain name service (DNS) is a distributed database that allows users to communicate with other computers by:
A) assigning IP addresses to different domain names.
B) mapping host names to domain names.
C) creating IP addresses that are unique to servers.
D) assigning domain names to different IP addresses.
E) mapping host and domain names to IP addresses of computers.
A) assigning IP addresses to different domain names.
B) mapping host names to domain names.
C) creating IP addresses that are unique to servers.
D) assigning domain names to different IP addresses.
E) mapping host and domain names to IP addresses of computers.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
25
_____ involves distributing a computing or networking workload across multiple systems in order to avoid congestion and slow performance.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
26
Key Inc., an American guitar maker, recently lost an action to recover the domain name piano-key.com, claiming that the defendant infringed on its registered trademark. What did Key Inc. specifically accuse the defendant of?
A) Sugging
B) Computer trespassing
C) Cybersquatting
D) Domain hoarding
E) Internet stalking
A) Sugging
B) Computer trespassing
C) Cybersquatting
D) Domain hoarding
E) Internet stalking
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
27
"Html" is used to:
A) load content from default page.
B) create and format Web pages.
C) generate custom content for users.
D) exchange mail with other e-mail servers.
E) transfer files from flash drives.
A) load content from default page.
B) create and format Web pages.
C) generate custom content for users.
D) exchange mail with other e-mail servers.
E) transfer files from flash drives.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
28
Routing protocol that is in charge of forwarding packets on the Internet is known as voice over Internet protocol.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
29
An exploit in which a hole in DNS software allows hackers to redirect users to sites they did not request is known as:
A) cybersquatting.
B) phishing.
C) an online imposture.
D) cache poisoning.
E) a distributed denial of request.
A) cybersquatting.
B) phishing.
C) an online imposture.
D) cache poisoning.
E) a distributed denial of request.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
30
The fault-tolerant nature of the DNS ensures that:
A) if users can't reach a host computer, they are redirected back to the previous page.
B) mistyped or misspelled Web addresses are automatically corrected.
C) if a document or file can't be accessed, it won't result in a 404 error.
D) the service continues functioning even if one nameserver goes down.
E) mismatched host names and domain names are still assigned with the correct IP address.
A) if users can't reach a host computer, they are redirected back to the previous page.
B) mistyped or misspelled Web addresses are automatically corrected.
C) if a document or file can't be accessed, it won't result in a 404 error.
D) the service continues functioning even if one nameserver goes down.
E) mismatched host names and domain names are still assigned with the correct IP address.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
31
_____ refers to the application transfer protocol that is used to copy files from one computer to another.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
32
The cache speeds up computing tasks by:
A) storing the domain names' users type in the Web browser.
B) placing bookmarks for favored Web pages.
C) storing IP addresses of hosts visited by users.
D) fetching Web addresses from the DNS.
E) loading content from default pages.
A) storing the domain names' users type in the Web browser.
B) placing bookmarks for favored Web pages.
C) storing IP addresses of hosts visited by users.
D) fetching Web addresses from the DNS.
E) loading content from default pages.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
33
Briefly describe how the DNS helps users communicate with each other.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
34
The protocol used for exchange of mail between e-mail servers across the world is called _____.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
35
A(n) _____ is a temporary storage space used to speed computing tasks.
A) cache
B) IP address
C) Protocol
D) domain name service
E) hypertext markup language
A) cache
B) IP address
C) Protocol
D) domain name service
E) hypertext markup language
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
36
Identify the various parts in the following Web address and briefly describe each of them:
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
37
_____ is the nonprofit organization responsible for managing the Internet's domain and numbering systems.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
38
TCP and IP operate above http and the other application transfer protocols.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
39
Network Address Translation (NAT) technique involves:
A) mapping devices on private networks to single Internet-connected devices acting on their behalf.
B) reassigning domain names and host names to different IP addresses.
C) translating IP addresses from the presently used IPv4 scheme to the advanced IPv6 scheme.
D) integrating domain names and host names to represent the same IP address.
E) forming a hybrid of IPv4 and IPv6 schemes that temporarily enable communication between two computers on these different schemes.
A) mapping devices on private networks to single Internet-connected devices acting on their behalf.
B) reassigning domain names and host names to different IP addresses.
C) translating IP addresses from the presently used IPv4 scheme to the advanced IPv6 scheme.
D) integrating domain names and host names to represent the same IP address.
E) forming a hybrid of IPv4 and IPv6 schemes that temporarily enable communication between two computers on these different schemes.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
40
What is cybersquatting?
A) Overwhelming a firm's Web site by flooding it with seemingly legitimate messages
B) Acquiring a domain name that refers to a firm, individual, product, or trademark with the goal of exploiting it for financial gain
C) Causing an Internet-connected computer to malfunction
D) Threatening to destroy information stored in a firm's servers
E) Using the Internet to stalk or harass an individual or an organization
A) Overwhelming a firm's Web site by flooding it with seemingly legitimate messages
B) Acquiring a domain name that refers to a firm, individual, product, or trademark with the goal of exploiting it for financial gain
C) Causing an Internet-connected computer to malfunction
D) Threatening to destroy information stored in a firm's servers
E) Using the Internet to stalk or harass an individual or an organization
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
41
The User Datagram Protocol (UDP) acts as a substitute to TCP when there is a need for speed of communication and quality can be sacrificed.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
42
Compare circuit- and packet-switched networks.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
43
_____ act as storage places where a firm's servers get super-fast connections as close to the action as possible.
A) Colocation facilities
B) Incubation facilities
C) Internet exchange points
D) Dispatch facilities
E) Preening facilities
A) Colocation facilities
B) Incubation facilities
C) Internet exchange points
D) Dispatch facilities
E) Preening facilities
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
44
Describe the process involving the transmission of a Web page from a Web server to a user's computer.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
45
____ repeatedly sends a cluster of three packets starting at the first router connected to a computer, then the next, and so on, building out the path that packets take to their destination.
A) Firewall
B) Router
C) Pathfinder
D) Mapper
E) Traceroute
A) Firewall
B) Router
C) Pathfinder
D) Mapper
E) Traceroute
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
46
ISPs and IXPs that carry out peering generate revenue by charging each other fees based on their traffic contribution.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following applications is most likely to use UDP instead of TCP?
A) E-mail
B) Web transmissions
C) File transfer
D) Peer-to-peer downloads
E) Web-based phone calls
A) E-mail
B) Web transmissions
C) File transfer
D) Peer-to-peer downloads
E) Web-based phone calls
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
48
When considering overall network speed, a system's speed is determined by its fastest component.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
49
Internet networks are _____.
A) bit-switched networks
B) circuit-switched networks
C) data-switched networks
D) packet-switched networks
E) byte-switched networks
A) bit-switched networks
B) circuit-switched networks
C) data-switched networks
D) packet-switched networks
E) byte-switched networks
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
50
Peering refers to:
A) high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.
B) the broadband service provided via light-transmitting fiber-optic cables.
C) the language used to compose Web pages.
D) a situation when separate ISPs connect their networking equipment together to share traffic.
E) a system that connects end users to the Internet.
A) high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.
B) the broadband service provided via light-transmitting fiber-optic cables.
C) the language used to compose Web pages.
D) a situation when separate ISPs connect their networking equipment together to share traffic.
E) a system that connects end users to the Internet.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
51
A unit of data forwarded by a network is called _____.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
52
One of the functions of the IP is to:
A) route message packets to the final destination.
B) slice up the message into smaller chunks of data called packets, to be sent over the network.
C) check for damaged or corrupt message packets and request for replacements, if needed.
D) label message packets with source and destination addresses.
E) rearrange message packets in the same sequence as they were sent.
A) route message packets to the final destination.
B) slice up the message into smaller chunks of data called packets, to be sent over the network.
C) check for damaged or corrupt message packets and request for replacements, if needed.
D) label message packets with source and destination addresses.
E) rearrange message packets in the same sequence as they were sent.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
53
Peering usually takes place at neutral sites called _____.
A) https
B) IPs
C) ISPs
D) IXPs
E) STPs
A) https
B) IPs
C) ISPs
D) IXPs
E) STPs
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
54
The Internet Protocol Suite consists of the Internet Protocol and _____.
A) File Transfer Protocol
B) Simple Mail Transfer Protocol
C) Session Initiation Protocol
D) Datagram Congestion Control Protocol
E) Transmission Control Protocol
A) File Transfer Protocol
B) Simple Mail Transfer Protocol
C) Session Initiation Protocol
D) Datagram Congestion Control Protocol
E) Transmission Control Protocol
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
55
_____ involves allowing voice packets to gain delivery importance over packets for applications like e-mail.
A) Voice precedence
B) Data rationing
C) Right-of-way for voice
D) Information queuing
E) Packet prioritization
A) Voice precedence
B) Data rationing
C) Right-of-way for voice
D) Information queuing
E) Packet prioritization
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following represents the correct sequence of actions taken by the TCP at the destination computer to ensure a perfect copy of the sent message is received?
A) Slice the message into packets; route the packets to the destination; check if packets are damaged; request for new copies of damaged packets
B) Check if all sent packets are received; check if packets are damaged; request for new copies of damaged packets; put packets in correct order
C) Slice the message into packets; check if packets are damaged; put packets in correct order; request for new copies of damaged packets
D) Route the packets to the destination; put packets in correct order; check if packets are damaged; request for new copies of damaged packets
E) Put the packets in correct order; check if all sent packets are received; check if packets are damaged; request for new copies of damaged packets
A) Slice the message into packets; route the packets to the destination; check if packets are damaged; request for new copies of damaged packets
B) Check if all sent packets are received; check if packets are damaged; request for new copies of damaged packets; put packets in correct order
C) Slice the message into packets; check if packets are damaged; put packets in correct order; request for new copies of damaged packets
D) Route the packets to the destination; put packets in correct order; check if packets are damaged; request for new copies of damaged packets
E) Put the packets in correct order; check if all sent packets are received; check if packets are damaged; request for new copies of damaged packets
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
57
A(n) _____ is a computing device that connects networks and exchanges data between them.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
58
Circuit-switched networks are more efficient than packet-switched networks because of the nature of the dedicated connection they provide.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
59
Circuit-switched networks provide connection between two parties by:
A) assigning entire circuit capacity to the call on a first-come first-serve basis.
B) dedicating a part of the circuit capacity to the call.
C) repeatedly switching between an open and closed state depending on the duration of the call.
D) slicing up the conversation into smaller chunks and transmitting them over the circuit.
E) prioritizing voice calls over other connections.
A) assigning entire circuit capacity to the call on a first-come first-serve basis.
B) dedicating a part of the circuit capacity to the call.
C) repeatedly switching between an open and closed state depending on the duration of the call.
D) slicing up the conversation into smaller chunks and transmitting them over the circuit.
E) prioritizing voice calls over other connections.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
60
Most mobile cell phone services are exempted from having to license the wireless spectrum for transmission.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
61
The range of frequencies used for communication is known as _____.
A) communication orbit
B) mobile service array
C) wireless spectrum
D) communication backbone
E) communication bandwidth
A) communication orbit
B) mobile service array
C) wireless spectrum
D) communication backbone
E) communication bandwidth
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
62
The ____ wireless technology is limited by its inability to support voice and data communication at the same time.
A) GSM
B) GPRS
C) 3G
D) 4G
E) CDMA
A) GSM
B) GPRS
C) 3G
D) 4G
E) CDMA
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
63
4G technologies fall into two standards camps, namely _____ and _____.
A) Wi-fi; GPRS
B) LTE; WiMax
C) CDMA; GSM
D) WEP; WAP
E) PDC; TDMA
A) Wi-fi; GPRS
B) LTE; WiMax
C) CDMA; GSM
D) WEP; WAP
E) PDC; TDMA
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
64
Which of the following statements is true about Google's efforts aimed at bringing high-speed fiber to several U.S. communities, including Kansas City, Kansas, and Kansas City, Missouri?
A) It is aimed at becoming a nationwide ISP itself.
B) It will be "closed," preventing other service providers from using Google's infrastructure to resell services to consumers.
C) It is an effort to investigate ways to build and operate exclusive networks.
D) It is an effort to bring speeds of 5 Gbps to customers.
E) Google deems its effort an experiment.
A) It is aimed at becoming a nationwide ISP itself.
B) It will be "closed," preventing other service providers from using Google's infrastructure to resell services to consumers.
C) It is an effort to investigate ways to build and operate exclusive networks.
D) It is an effort to bring speeds of 5 Gbps to customers.
E) Google deems its effort an experiment.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
65
One of the disadvantages of cable technology is that:
A) it is more expensive than other signal-carrying systems.
B) it is liable to periodic replacement owing to physical wear and tear.
C) customers have to share bandwidth with neighbors.
D) it is incompatible with most modern communication systems.
E) the speed of the connection depends on the distance between the end customer from the central hub.
A) it is more expensive than other signal-carrying systems.
B) it is liable to periodic replacement owing to physical wear and tear.
C) customers have to share bandwidth with neighbors.
D) it is incompatible with most modern communication systems.
E) the speed of the connection depends on the distance between the end customer from the central hub.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
66
The basic unit of expression for bandwidth is _____.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
67
Briefly describe a few of the measures being taken to speed up the Internet's last mile.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
68
A potential roadblock to transition of DSL to FTTH is the:
A) high costs of building entirely new networks.
B) exorbitant prices charged by service providers.
C) impracticality of switching to a technology that is not proven yet.
D) location driven quality of service offered by fiber optic technology.
E) high possibility of external interference and hence, fears of information security.
A) high costs of building entirely new networks.
B) exorbitant prices charged by service providers.
C) impracticality of switching to a technology that is not proven yet.
D) location driven quality of service offered by fiber optic technology.
E) high possibility of external interference and hence, fears of information security.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
69
The two parties to the debate surrounding the principle of net neutrality are:
A) mobile service providers and governments.
B) Internet service firms and the FCC.
C) cable broadband firms and FTTH firms.
D) wireless service providers and cable service providers.
E) governments and the movie industry.
A) mobile service providers and governments.
B) Internet service firms and the FCC.
C) cable broadband firms and FTTH firms.
D) wireless service providers and cable service providers.
E) governments and the movie industry.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
70
_____ technology is a broadband technology that uses wires of a local telephone network.
A) Fiber to the Home (FTTH)
B) Digital Subscriber Line (DSL)
C) Coaxial cable
D) Telecom-broadband hybrid
E) Broadband over power line (BPL)
A) Fiber to the Home (FTTH)
B) Digital Subscriber Line (DSL)
C) Coaxial cable
D) Telecom-broadband hybrid
E) Broadband over power line (BPL)
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
71
Explain the evolution of satellite wireless telecommunication technology.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
72
Most residential providers of cable technology use a system that requires customers to share bandwidth with neighbors.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
73
Which of the following statements is true of the term "FTTH"?
A) It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.
B) It refers to broadband service provided via light-transmitting fiber-optic cables.
C) It refers to the language used to compose Web pages.
D) It refers to a situation when separate ISPs link their networks to swap traffic on the Internet.
E) It refers to a system that connects end users to the Internet.
A) It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.
B) It refers to broadband service provided via light-transmitting fiber-optic cables.
C) It refers to the language used to compose Web pages.
D) It refers to a situation when separate ISPs link their networks to swap traffic on the Internet.
E) It refers to a system that connects end users to the Internet.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
74
DSL technology is expensive for service providers in the United States because of the sparsely populated cities.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
75
Mobile providers can be susceptible to poor coverage indoors as a result of:
A) spectrum used by most mobile phone firms that does not travel well through solid objects.
B) a high degree of latency.
C) network congestion that clogs up the network traffic.
D) a lack of sufficient number of towers owing to the not-in-my-backyard problem.
E) an increase in bandwidth demand placed on their networks.
A) spectrum used by most mobile phone firms that does not travel well through solid objects.
B) a high degree of latency.
C) network congestion that clogs up the network traffic.
D) a lack of sufficient number of towers owing to the not-in-my-backyard problem.
E) an increase in bandwidth demand placed on their networks.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
76
Which of the following refers to wireless systems provided by earth-bound stations like cell phone towers?
A) Geostationary wireless
B) Ground wireless
C) Terrestrial wireless
D) Geosynchronous wireless
E) High fidelity wireless
A) Geostationary wireless
B) Ground wireless
C) Terrestrial wireless
D) Geosynchronous wireless
E) High fidelity wireless
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
77
_____ is the insulated copper cable commonly used by cable television providers with shielding to reduce electrical interference.
A) Optical fiber cable
B) Coaxial cable
C) Ribbon cable
D) Bowden cable
E) Straight cable
A) Optical fiber cable
B) Coaxial cable
C) Ribbon cable
D) Bowden cable
E) Straight cable
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
78
To overcome reception and availability problems, mobile telecom services firms have begun _____ that provide a "five bar" coverage in a roughly 5,000-square-foot footprint.
A) providing incentives to communities that allow the construction of towers
B) building smaller towers that people don't mind seeing in the neighborhood
C) offering femtocells
D) providing wi-fi base stations at very low costs
E) providing unique IP addresses
A) providing incentives to communities that allow the construction of towers
B) building smaller towers that people don't mind seeing in the neighborhood
C) offering femtocells
D) providing wi-fi base stations at very low costs
E) providing unique IP addresses
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
79
It is feared that innovation might suffer as a result of the transition of Internet services from flat-rate pricing to metered usage.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck
80
Which of the following is true of the term Internet backbone?
A) It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.
B) It refers to broadband service provided via light-transmitting fiber-optic cables.
C) It refers to the language used to compose Web pages.
D) It refers to a situation when separate ISPs link their networks to swap traffic on the Internet.
E) It refers to a system that connects end users to the Internet.
A) It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.
B) It refers to broadband service provided via light-transmitting fiber-optic cables.
C) It refers to the language used to compose Web pages.
D) It refers to a situation when separate ISPs link their networks to swap traffic on the Internet.
E) It refers to a system that connects end users to the Internet.
Unlock Deck
Unlock for access to all 83 flashcards in this deck.
Unlock Deck
k this deck