exam - s3.amazonaws.coms3.amazonaws.com/prealliance_oneclass_sample/5j7k2b7vnp.pdf · answer: true...

24
Exam Name___________________________________ TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 1) Telephone networks are fundamentally different from computer networks. 1) _______ Answer: True False 2) Increasingly, voice, video, and data communications are all based on Internet technology. 2) _______ Answer: True False 3) Firms in the past used two fundamentally different types of networks: telephone networks and computer networks. 3) _______ 10) TCP refers to the Transmission Control Protocol (TCP), which is responsible for the delivery of packets and includes the disassembling and reassembling of packets during transmission. 10) ______ Answer: True False 11) IP refers to the Internet Protocol (IP), establishes a connection between the computers, sequences the transfer of packets, and acknowledges the packets sent. 11) ______ Answer: True False 12) A digital signal is represented by a continuous waveform that passes through a communications medium; analog signals are used for voice communication. 12) ______ Answer: True False

Upload: dangxuyen

Post on 06-Mar-2018

215 views

Category:

Documents


1 download

TRANSCRIPT

Exam

Name___________________________________

TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false.

1) Telephone networks are fundamentally different from computer networks. 1) _______

Answer: True False

2) Increasingly, voice, video, and data communications are all based on Internet technology. 2) _______

Answer: True False

3) Firms in the past used two fundamentally different types of networks: telephone networks and

computer networks.

3) _______

Answer: True False

4) Due to continuing telecommunications deregulation and information technology innovation,

telephone and computer networks are slowly converging into a single digital network using

shared Internet-based standards and equipment.

4) _______

Answer: True False

5) Increasingly, voice and data communication as well as Internet access are taking place over

broadband wireless platforms, such as cell phones, handheld digital devices, and PCs in wireless

networks.

5) _______

Answer: True False

6) Each computer on the network contains a network interface device called a network operating

card (NOC).

6) _______

Answer: True False

7) Contemporary digital networks and the Internet are based on four key technologies:

client/server computing, the use of packet switching, the development of widely used

communications standards and PC operating systems.

7) _______

Answer: True False

8) Pocket switching is a method of slicing digital messages into parcels called pockets, sending the

pockets along different communication paths as they become available, and then reassembling

the pockets once they arrive at their destinations.

8) _______

Answer: True False

9) Packet switching makes much less efficient use of the communications capacity of a network. 9) _______

Answer: True False

10) TCP refers to the Transmission Control Protocol (TCP), which is responsible for the delivery of

packets and includes the disassembling and reassembling of packets during transmission.

10) ______

Answer: True False

11) IP refers to the Internet Protocol (IP), establishes a connection between the computers, sequences

the transfer of packets, and acknowledges the packets sent.

11) ______

Answer: True False

12) A digital signal is represented by a continuous waveform that passes through a communications

medium; analog signals are used for voice communication.

12) ______

Answer: True False

13) A analog signal is a discrete, binary waveform, rather than a continuous waveform. 13) ______

Answer: True False

14) A modem is a device that translates digital signals from a computer into analog form so that they

can be transmitted over analog telephone lines.

14) ______

Answer: True False

15) A local-area network (LAN) is designed to connect personal computers and other digital devices

within a half-mile or 500-metre radius.

15) ______

Answer: True False

16) The most common LAN operating systems are Windows, Linux, and Novell. 16) ______

Answer: True False

17) Ethernet is the dominant LAN standard at the physical network level, specifying the physical

medium to carry signals between computers; access control rules; and a standardized set of bits

used to carry data over the system.

17) ______

Answer: True False

18) A peer-to-peer network treats all processors equally and is used primarily in small networks

with 10 or fewer users.

18) ______

Answer: True False

19) Sometimes LANs are described in terms of the way their components are connected together, or

their topology.

19) ______

Answer: True False

20) In a bus topology, one station transmits signals, which travel in both directions along a single

transmission segment.

20) ______

Answer: True False

21) Wide-area networks (WAN) is a network that spans a metropolitan area, usually a city and its

major suburbs.

21) ______

Answer: True False

22) Metropolitan-area network (MAN)span broad geographical distances–entire regions, states,

continents, or the entire globe.

22) ______

Answer: True False

23) Twisted wire consists of strands of copper wire twisted in pairs and is an older type of

transmission medium.

23) ______

Answer: True False

24) Microwave systems, both terrestrial and celestial, transmit high-frequency radio signals through

the atmosphere and are widely used for high-volume, long-distance, point-to-point

communication.

24) ______

Answer: True False

25) The range of frequencies that can be accommodated on a particular telecommunications channel

is called its bandwidth.

25) ______

Answer: True False

26) An Internet service provider (ISP) is a commercial organization with a temporary connection to

the Internet that sells permanent connections to retail subscribers.

26) ______

Answer: True False

27) Digital subscriber line (DSL) provided by cable television vendors use digital cable coaxial lines

to deliver high-speed Internet access to homes and businesses.

27) ______

Answer: True False

28) The domain name is the English-like name that corresponds to the unique 32-bit numeric IP

address for each computer connected to the Internet.

28) ______

Answer: True False

29) To connect two computers together in the same office, you must have a computer network. 29) ______

Answer: True False

30) An NOS must reside on a dedicated server computer in order to manage a network. 30) ______

Answer: True False

31) A hub is a networking device that connects network components and are used to filter and

forward data to specified destinations on the network.

31) ______

Answer: True False

32) In a client/server network, a network server provides every connected client with an address so

it can be found by others on the network.

32) ______

Answer: True False

33) Central large mainframe computing has largely replaced client/server computing. 33) ______

Answer: True False

34) Circuit switching makes much more efficient use of the communications capacity of a network

than does packet switching.

34) ______

Answer: True False

35) A protocol is a standard set of rules and procedures for the control of communications in a

network.

35) ______

Answer: True False

36) Two computers using TCP/IP can communicate even if they are based on different hardware

and software platforms.

36) ______

Answer: True False

37) In a ring topology, one station transmits signals, which travel in both directions along a single

transmission segment.

37) ______

Answer: True False

38) Coaxial cable is similar to that used for cable television and consists of thickly insulated copper

wire.

38) ______

Answer: True False

39) Fiber-optic cable is more expensive and harder to install than wire media. 39) ______

Answer: True False

40) The number of cycles per second that can be sent through any telecommunications medium is

measured in kilobytes.

40) ______

Answer: True False

41) The success of the Internet is in part due to its design as an infinitely scalable network capable of

handling millions of users.

41) ______

Answer: True False

42) VoIP technology delivers video information in digital form using packet switching. 42) ______

Answer: True False

43) Web 2.0 is the collaborative effort led by the World Wide Web Consortium to add a layer of

meaning atop the existing Web to reduce the amount of human involvement in searching for

and processing Web information.

43) ______

Answer: True False

44) Wi-Fi enables users to freely roam from hotspot to hotspot even if the hotspot is using different

Wi-Fi network services.

44) ______

Answer: True False

45) WiMax has a wireless access range of up to 300 feet. 45) ______

Answer: True False

46) RFID has been exceptionally popular because of its low implementation costs. 46) ______

Answer: True False

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

47) A device that acts as a connection point between computers and can filter and forward data to a

specified destination is called a

47) ______

A) switch. B) hub. C) NIC. D) router.

Answer: A

48) The Internet is based on which three key technologies? 48) ______

A) TCP/IP, HTML, and HTTP

B) Client/server computing, packet switching, and HTTP

C) Client/server computing, packet switching, and the development of communications

standards for linking networks and computers

D) TCP/IP, HTTP, and packet switching

Answer: C

49) The method of slicing digital messages into parcels, transmitting them along different

communication paths, and reassembling them at their destinations is called

49) ______

A) ATM. B) packet switching.

C) packet routing. D) multiplexing.

Answer: B

50) The telephone system is an example of a ________ network. 50) ______

A) circuit-switched B) peer-to-peer

C) packet-switched D) wireless

Answer: A

51) Which of the following is NOT a characteristic of packet switching? 51) ______

A) Packets include data for checking transmission errors.

B) Packets are routed through many different paths.

C) Packet switching requires point-to-point circuits.

D) Packets travel independently of each other.

Answer: C

52) In TCP/IP, IP is responsible for 52) ______

A) moving packets over the network.

B) sequencing the transfer of packets.

C) disassembling and reassembling of packets during transmission.

D) establishing an Internet connection between two computers.

Answer: C

53) In a telecommunications network architecture, a protocol is 53) ______

A) the main computer in a telecommunications network.

B) a communications service for microcomputer users.

C) a device that handles the switching of voice and data in a local area network.

D) a standard set of rules and procedures for control of communications in a network.

Answer: D

54) The four layers of the TCP/IP reference model are 54) ______

A) physical layer, application layer, Internet layer, and the network interface layer.

B) application layer, transport layer, Internet layer, and the network interface layer.

C) physical layer, application layer, transport layer, and the network interface layer.

D) application layer, hardware layer, Internet layer, and the network interface layer.

Answer: B

55) Which signal types are represented by a continuous waveform? 55) ______

A) optical B) laser C) analog D) digital

Answer: B

56) To use an analog telephone system for sending digital data, you must us 56) ______

A) a router. B) twisted wire. C) a modem. D) DSL.

Answer: C

57) Which type of network is used to connect digital devices within a half-mile or 500-meter radius? 57) ______

A) MAN B) LAN C) microwave D) WAN

Answer: B

58) Which type of network treats all processors equally, and allows peripheral devices to be shared

without going to a separate server?

58) ______

A) peer-to-peer B) ring C) LAN D) wireless

Answer: A

59) Which type of network would be most appropriate for a business that comprised three

employees and a manager located in the same office space, whose primary need is to share

documents?

59) ______

A) campus area network B) domain-based LAN

C) wireless network in infrastructure mode D) peer-to-peer network

Answer: D

60) In a bus network 60) ______

A) multiple hubs are organized in a hierarchy.

B) signals are broadcast in both directions to the entire network.

C) messages pass from computer to computer in a loop.

D) signals are broadcast to the next station.

Answer: B

61) All network components connect to a single hub in a ________ network. 61) ______

A) bus B) star C) peer-to-peer D) domain

Answer: B

62) The most common Ethernet topology is 62) ______

A) ring. B) bus. C) star. D) mesh.

Answer: B

63) A network that spans a city, and sometimes its major suburbs as well, is called a 63) ______

A) LAN. B) WAN. C) MAN. D) CAN.

Answer: C

64) A network that covers entire geographical regions is most commonly referred to as a(n): 64) ______

A) local area network. B) wide area network.

C) intranet. D) peer-to-peer network.

Answer: B

65) ________ work(s) by using radio waves to communicate with radio antennas placed within

adjacent geographic areas.

65) ______

A) Satellites B) WANs C) Microwaves D) Cell phones

Answer: D

66) Bandwidth is the 66) ______

A) number of frequencies that can be broadcast through a medium.

B) difference between the highest and lowest frequencies that can be accommodated on a

single channel.

C) total number of bytes that can be sent through a medium per second.

D) number of cycles per second that can be sent through a medium.

Answer: B

67) The total amount of digital information that can be transmitted through any telecommunications

medium is measured in

67) ______

A) baud. B) gigaflops. C) bps. D) Hertz.

Answer: C

68) Digital subscriber lines 68) ______

A) operate over coaxial lines to deliver Internet access.

B) have up to twenty-four 64-Kbps channels.

C) operate over existing telephone lines to carry voice, data, and video.

D) are very-high-speed data lines typically leased from long-distance telephone companies.

Answer: C

69) T lines 69) ______

A) are very-high-speed data lines typically leased from long-distance telephone companies.

B) operate over existing telephone lines to carry voice, data, and video.

C) have up to twenty-four 64-Kbps channels.

D) operate over coaxial lines to deliver Internet access.

Answer: A

70) Which protocol is the Internet based on? 70) ______

A) TCP/IP B) FTP

C) HTTP D) packet-switching

Answer: A

71) What service converts IP addresses into more recognizable alphanumeric names? 71) ______

A) HTTP B) DNS C) IP D) HTML

Answer: B

72) The child domain of the root is the 72) ______

A) second-level domain. B) host name.

C) top-level domain. D) domain extension.

Answer: C

73) In the domain name "http://myspace.blogging.com", what are the root, top-level, second-level,

and third-level domains, respectively?

73) ______

A) ".", myspace, blogging, com B) ".", com, blogging, myspace

C) "http://", com, blogging, myspace D) "http://", myspace, blogging, com

Answer: B

74) Which organization helps define the overall structure of the Internet? 74) ______

A) None (no one "owns" the Internet) B) IAB

C) W3C D) ICANN

Answer: B

75) IPv6 is being developed in order to 75) ______

A) allow for different levels of service.

B) support Internet2.

C) create more IP addresses.

D) update the packet transmission protocols for higher bandwidth.

Answer: C

76) Which of the following services enables logging on to one computer system and working on

another?

76) ______

A) LISTSERV B) Telnet

C) World Wide Web D) FTP

Answer: B

77) Instant messaging is a type of ________ service. 77) ______

A) cellular B) chat C) Web D) wireless

Answer: B

78) The need in some cases for employees to have access to sexually explicit material on the Internet,

such as medical researchers, suggests that companies

78) ______

A) need to base their Internet use policies on the needs of the organization and culture.

B) cannot restrict Internet use.

C) may need to maintain a database of acceptable Web sites.

D) need specialized software to determine which types of material are acceptable.

Answer: A

79) ________ integrate(s) disparate channels for voice communications, data communications,

instant messaging, e-mail, and electronic conferencing into a single experience.

79) ______

A) Virtual private networks B) Intranets

C) Wireless networks D) Unified communications

Answer: D

80) A VPN 80) ______

A) is an encrypted private network configured within a public network.

B) provides secure, encrypted communications using Telnet.

C) is an Internet-based service for delivering voice communications.

D) is more expensive than a dedicated network.

Answer: A

81) Web browser software requests Web pages from the Internet using which protocol? 81) ______

A) HTTP B) HTML C) URL D) DNS

Answer: A

82) Together, a protocol prefix, a domain name, a directory path, and a document name, are called

a(n)

82) ______

A) uniform resource locator. B) third level domain.

C) root domain. D) unified resource locator.

Answer: A

83) The open-source Web server that controls 70 percent of the market is 83) ______

A) Microsoft IIS. B) Apache HTTP server.

C) ASP.net. D) Netscape.

Answer: B

84) What technology allows people to have content pulled from Web sites and fed automatically to

their computers?

84) ______

A) FTP B) HTTP C) RSS D) Bluetooth

Answer: C

85) To keep internal data secure, a company employing an extranet must be sure to put a ________

in place

85) ______

A) router B) server C) switch D) firewall

Answer: D

86) A network that connects authorized customers, suppliers, and other business partners to

portions of a firm's internal network is called a(n)

86) ______

A) virtual private network. B) enterprise network.

C) extranet. D) intranet.

Answer: C

87) Which generation of network are wireless cellular phone systems entering? 87) ______

A) 2.5G B) 3G C) 4G D) 3.5G

Answer: B

88) CDMA 88) ______

A) is the major European digital cellular standard.

B) transmits over several frequencies.

C) is more expensive than GSM.

D) uses the 1.9 GHz band.

Answer: B

89) The most appropriate wireless networking standard for creating PANs is 89) ______

A) Bluetooth. B) I-mode. C) IEEE 802.11b. D) WiFi.

Answer: A

90) Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power,

radio-based communication.

90) ______

A) ten B) six C) four D) eight

Answer: D

91) The Wi-Fi 802.11a standard can transmit up to 91) ______

A) 54 Mbps in the 2.4-GHz frequency range.

B) 11 Mbps in the 2.4-GHz frequency range.

C) 722 Kbps in the 2.4-GHz frequency range.

D) 54 Mbps in the 5-GHz frequency range.

Answer: D

92) One or more access points positioned on a ceiling, wall, or other strategic spot in a public place

to provide maximum wireless coverage for a specific area are referred to as

92) ______

A) hot points. B) wireless hubs. C) hotspots. D) touch points.

Answer: C

93) The IEEE standard for the WiMax is 93) ______

A) IEEE 802.15. B) IEEE 802.20. C) IEEE 802.16. D) IEEE 802.11.

Answer: C

94) The WiMax standard can transmit up to a distance of approximately 94) ______

A) 30 miles. B) 30 meters. C) 500 meters. D) 5 miles.

Answer: A

95) Passive RFID tags 95) ______

A) have a range of several feet.

B) enable data to be rewritten and modified.

C) have their own power source.

D) are used in automated toll-collection systems.

Answer: A

96) ________ are very simple devices that connect network components, sending a packet of data to

all other connected devices.

96) ______

A) Hubs B) NOS C) Router D) Switch

Answer: A

97) A ________ has more intelligence than a hub and can filter and forward data to a specified

destination on the network.

97) ______

A) NOS B) router C) hubs D) switch

Answer: D

98) A ________ is a special communications processor used to route packets of data through diff erent

networks

,

ensuring

that the

data sent

gets to

the

correct

address.

98) ___

___

A) hubs B) NOS C) switch D) router

Answer: D

99) The ________ routes and manages communications on the network and coordinates network

resources.

99) ______

A) NOS B) switch C) router D) hubs

Answer: A

100) John is evaluating the new system of computing that has just been installed in his firm. The

new ________ computing has extended computing to various departments, workgroups, factory

floors, and other parts of the business that could not be served by the centralized architecture

that was replaced with this new system.

100) _____

A) mainframe B) customer/client C) PDA D) client/server

Answer: D

101) The ________ enables client application programs to access the other layers and defines the

protocols that applications use to exchange data. One of these application protocols is the

Hypertext Transfer Protocol (HTTP), which is used to transfer Web page files.

101) _____

A) application layer B) internet layer

C) network interface layer D) transport layer

Answer: A

102) Bob is trying to decide to decide which type of physical transmission media to install that his

LAN needs. Bob is in an older building in the downtown core of the city. He needs speeds up

to 1 Gbps and the network needs to have a maximum run of 60 metres. Which type of

transmission media is Bob going to install?

102) _____

A) coaxial cable B) fiber optic cable

C) twisted wire D) microwave systems

Answer: C

103) Larry is trying to decide to decide which type of physical transmission media to install for his

LAN needs. Larry's firm is in a very large building. He needs speeds up to 1 Gbps and the

network needs to have a maximum run of 140 metres. Which type of transmission media is

Larry going to install?

103) _____

A) twisted wire B) coaxial cable

C) microwave systems D) fiber optic cable

Answer: B

104) Sally is the head CTV news in Canada. CTV is having trouble with their network because they

have too much data to transfer for the current physical transmission media that is in place.

Sally knows that much of the data they transfer is video and lots of it. Which type of media

should Sally consider as they perform this upgrade?

104) _____

A) fiber optic cable B) coaxial cable

C) microwave systems D) twisted wire

Answer: A

105) Gordon is wondering what is the best physical transmission media to use for high-volume,

long-distance, point-to-point communication that his firm needs. Which media should Gordon

consider for his situation?

105) _____

A) microwave systems B) fiber optic cable

C) coaxial cable D) twisted wire

Answer: A

106) Internet data traffic is carried over transcontinental high-speed backbone networks that

generally operate today in the range of 45 Mbps to 2.5 Gbps. These trunk lines are typically

owned by ________.

106) _____

A) network service providers B) regional telephone and cable companies

C) coaxial cable D) ISP

Answer: A

107) Local connection lines are owned by regional ________ that connect retail users in homes and

businesses to the Internet.

107) _____

A) network service providers

B) ISP

C) coaxial cable

D) telephone and cable television companies

Answer: D

108) The regional networks lease access to ________. 108) _____

A) ISPs, private companies, and government institutions.

B) network service providers

C) coaxial cable

D) telephone and cable television companies

Answer: A

109) Network neutrality is the idea that Internet service providers must allow customers ________. 109) _____

A) unequal access to content and applications, regardless of the source or nature of the content

B) unequal access to content and applications, depending on the source or nature of the

content

C) equal access to content and applications, regardless of the source or nature of the content

D) equal access to content and applications, depending on the source or nature of the content

Answer: C

110) Canadian companies have the ________. 110) _____

A) legal right to monitor what employees are doing with non-company equipment during

business hours

B) legal right to monitor what customer are doing with non-company equipment during

business hours

C) legal right to monitor what employees are doing with company equipment during business

hours

D) ethical right to monitor what employees are doing with company equipment during

business hours.

Answer: C

111) Based on your reading of the examples in the chapter, what would be the best use of RFID for a busi ness?

111) _____

A) enabling client communication B) supply chain management

C) transactions D) lowering network costs

Answer: B

SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question.

112) The ________ is special software that routes and manages communications on the

network and coordinates networks resources.

112) ____________

Answer: network operating system

113) Firms in the past used two fundamentally different types of ________: telephone

networks and computer networks.

113) ____________

Answer: networks

114) Due to continuing telecommunications ________ and information technology

innovation, telephone and computer networks are slowly converging into a single

digital network using shared Internet-based standards and equipment.

114) ____________

Answer: deregulation

115) Increasingly, voice and data ________ as well as Internet access are taking place over

broadband wireless platforms, such as cell phones, handheld digital devices, and PCs in

wireless networks.

115) ____________

Answer: communication

116) If you had to connect the computers for two or more employees together in the same

office, you would need a computer ________.

116) ____________

Answer: network

117) Each computer on the network contains a network interface device called a ________. 117) ____________

Answer: network interface card (NIC)

118) Contemporary digital networks and the Internet are based on three key technologies:

________ , the use of packet switching, and the development of widely used

communications standards for linking disparate networks and computers.

118) ____________

Answer: client/server computing

119) Packet switching makes much more ________ use of the communications capacity of a

network.

119) ____________

Answer: efficient

120) A ________ is a set of rules and procedures governing transmission of information

between two points in a network.

120) ____________

Answer: protocol

121) TCP/IP uses a suite of ________, the main ones being TCP and IP. 121) ____________

Answer: protocols

122) ________ establishes a connection between the computers, sequences the transfer of

packets, and acknowledges the packets sent.

122) ____________

Answer: TCP

123) IP refers to the Internet Protocol (IP), which is responsible for the ________ of packets and includes the

disassem

bling

and

reassemb

ling of

packets

during

transmis

sion.

123) ____

____

____

Answer: delivery

124) The ________ layer is responsible for addressing, routing, and packaging data packets

called IP datagrams.

124) ____________

Answer: Internet

125) An ________ is represented by a continuous waveform that passes through a

communications medium; analog signals are used for voice communication.

125) ____________

Answer: analog signal

126) A ________ is a discrete, binary waveform, rather than a continuous waveform. 126) ____________

Answer: digital signal

127) A ________ is a device that translates digital signals from a computer into analog form

so that they can be transmitted over analog telephone lines.

127) ____________

Answer: modem

128) A ________ is designed to connect personal computers and other digital devices within a

half-mile or 500-metre radius.

128) ____________

Answer: local-area network (LAN)

129) The most common LAN ________ systems are Windows, Linux, and Novell. 129) ____________

Answer: operating

130) ________ is the dominant LAN standard at the physical network level, specifying the

physical medium to carry signals between computers.

130) ____________

Answer: Ethernet

131) A ________ network treats all processors equally and is used primarily in small

networks with 10 or fewer users.

131) ____________

Answer: peer-to-peer

132) In a ________ , one station transmits signals, which travel in both directions along a

single transmission segment.

132) ____________

Answer: bus topology

133) ________ span broad geographical distances–entire regions, states, continents, or the

entire globe.

133) ____________

Answer: Wide-area networks (WANs)

134) A ________ is a network that spans a metropolitan area, usually a city and its major

suburbs. Its geographic scope falls between a WAN and a LAN.

134) ____________

Answer: metropolitan-area network (MAN)

135) ________ consists of strands of copper wire twisted in pairs and is an older type of

transmission medium.

135) ____________

Answer: Twisted wire

136) ________ , similar to that used for cable television, consists of thickly insulated copper

wire, which can transmit a larger volume of data than twisted wire.

136) ____________

Answer: Coaxial cable

137) ________ consists of bound strands of clear glass fibre, each the thickness of a human

hair.

137) ____________

Answer: Fibre optic cable

138) The range of frequencies that can be accommodated on a particular telecommunications

channel is called its ________.

138) ____________

Answer: bandwidth

139) ________ systems, both terrestrial and celestial, transmit high-frequency radio signals

through the atmosphere and are widely used for high-volume, long-distance,

point-to-point communication.

139) ____________

Answer: Microwave

140) An ________ is a commercial organization with a permanent connection to the Internet

that sells temporary connections to retail subscribers.

140) ____________

Answer: Internet service provider (ISP)

141) ________ technologies operate over existing telephone lines to carry voice, data, and

video at transmission rates ranging from 385 Kbps all the way up to 9 Mbps.

141) ____________

Answer: Digital subscriber line (DSL)

142) ________ connections provided by cable television vendors use digital cable coaxial lines

to deliver high-speed Internet access to homes and businesses.

142) ____________

Answer: Cable Internet

143) The ________ is the English-like name that corresponds to the unique 32-bit numeric IP

address for each computer connected to the Internet.

143) ____________

Answer: domain name

144) ________ technology delivers voice information in digital form using packet switching,

avoiding the tolls charged by local and long-distance telephone networks.

144) ____________

Answer: Voice over IP (VoIP)

145) When employees use e-mail or the Web at employer facilities or with employer

equipment, anything they do, including anything illegal, ________ the company’s name.

145) ____________

Answer: carries

146) Companies that allow employees to use personal e-mail accounts at work face legal and

regulatory trouble if they do not ________ those messages.

146) ____________

Answer: retain

147) Canadian companies have the legal right to ________ what employees are doing with

company equipment during business hours.

147) ____________

Answer: monitor

148) A ________ is a secure, encrypted, private network that has been configured within a

public network to take advantage of the economies of scale and management facilities of

large networks

148) ____________

Answer: virtual private network (VPN)

149) Prior to the development of ________, computer networks used leased, dedicated

telephone circuits to communicate with other computers in remote locations.

149) ____________

Answer: packet switching

150) A(n) ________ signal is a discrete, binary waveform that transmits data coded into two

discrete states such as 1-bits and 0-bits.

150) ____________

Answer: digital

151) ________ is the manner in which the components of a network are connected. 151) ____________

Answer: Topology

152) ________ is the dominant LAN standard at the physical network level. 152) ____________

Answer: Ethernet

153) A(n) ________ is a commercial organization with a permanent connection to the Internet

that sells temporary connections to retail subscribers.

153) ____________

Answer: Internet service provider

154) The backbone networks of the Internet are typically owned by long-distance telephone

companies called ________.

154) ____________

Answer: network service providers

155) A(n) ________ is software for locating and managing stored Web pages. 155) ____________

Answer: Web server

156) A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links

to a wired network, router, or hub.

156) ____________

Answer: access point

ESSAY. Write your answer in the space provided or on a separate sheet of paper.

157) How does packet switching work?

Answer: Packet switching is a method of slicing digital messages into parcels called packets, sending the

packets along different communication paths as they become available, and then reassembling the

packets once they arrive at their destinations. Packet switching makes much more efficient use of the

communications capacity of a network than did circuit-switching. In packet-switched networks,

messages are first broken down into small fixed bundles of data called packets. The packets include

information for directing the packet to the right address and for checking transmission errors along

with the data. The packets are transmitted over various communications channels using routers, each

packet traveling independently. Packets of data originating at one source will be routed through many

different paths and networks before being reassembled into the original message when they reach

their destinations.

158) Describe the principal components of telecommunications networks and key networking technologies?

Answer: A simple network consists of two or more connected computers. Basic network components include

computers, network interfaces, a connection medium, network operating system software, and either a

hub or a switch.

The networking

infrastructure for a

large company

includes the

traditional

telephone system,

mobile cellular communication, wireless local-area networks, videoconferencing systems, a corporate

Web site, intranets, extranets, and an array of local and wide-area networks, including the Internet.

Contemporary networks have been shaped by the rise of client/server computing, the use of packet

switching, and the adoption of Transmission Control Protocol/Internet Protocol (TCP/IP) as a

universal communications standard for linking disparate networks and computers, including the

Internet. Protocols provide a common set of rules that enable communication among diverse

components in a telecommunications network.

159) Murray is trying to decide what type of telecommunication transmission media and what type of network he

might use at the University of Lethbridge. Murray goes to the IS faculty to learn about these subjects in a

general way. Describe to Murray what the main telecommunications transmission media and type of

network the university would use.

Answer: The principal physical transmission media are twisted copper telephone wire, coaxial copper cable,

fibre optic cable, and wireless transmission. Twisted wire enables companies to use existing wiring for

telephone systems for digital communication although it is relatively slow. Fibre optic and coaxial

cable are used for high-volume transmission but are expensive to install. Microwave and

communications satellites are used for wireless communication over long distances. Local-area

networks (LANs) connect PCs and other digital devices together within a 500-metre radius and are

used today for many corporate computing tasks. Network components may be connected together

using a star, bus, or ring topology. Wide-area networks (WANs) span broad geographical distances,

ranging from several kilometres to continents, and are private networks that are independently

managed. Metropolitan-area networks (MANs) span a single urban area. Digital subscriber line (DSL)

technologies, cable Internet connections, and T1 lines are often used for high-capacity Internet

connections. Cable Internet connections provide high-speed access to the Web or corporate intranets at

speeds of up to 10 Mbps. A T1 line supports a data transmission rate of 1.544 Mbps.

160) Linda has been reading in the popular press all about RFID and wireless sensor networks. She is in the

livestock business and wonders if there might be some applications of this technology in her industry.

Linda first wants to understand the basics of these technologies. Describe for her why radio frequency

identification (RFID) and wireless sensor networks can be valuable for business.

Answer: Radio frequency identification (RFID) systems provide a powerful technology for tracking the

movement of goods by using tiny tags with embedded data about an item and its location. RFID

readers read the radio signals transmitted by these tags and pass the data over a network to a

computer for processing. Wireless sensor networks (WSNs) are networks of interconnected wireless

sensing and transmitting devices that are embedded into the physical environment to provide

measurements of many points over large spaces.

161) Identify the layers of the Department of Defense reference model for TCP/IP, and describe how this model

works.

Answer: The application layer enables client application programs to access the other layers and defines the

protocols that applications use to exchange data. One of these application protocols is the Hypertext

Transfer Protocol (HTTP), which is used to transfer Web page files. The transport layer is responsible

for providing the application layer with communication and packet services. This layer includes TCP

and other protocols. The Internet layer is responsible for addressing, routing, and packaging data

packets called IP datagrams. The Internet Protocol is one of the protocols used in this layer. At the

bottom of the reference model, the network interface layer is responsible for placing packets on and

receiving them from the network medium, which could be any networking technology. Data sent from

one computer to the other passes downward through all four layers, starting with the sending

computer's application layer and passing through the network interface layer. After the data reach the

recipient host computer, they travel up the layers and are reassembled into a format the receiving

computer can use. If the receiving computer finds a damaged packet, it asks the sending computer to

retransmit it. This process is reversed when the receiving computer responds.

162) You have been hired by a tax preparation firm to set up a network connecting several new branches in a

metropolitan area. What type of network hardware and transmission media will you choose and why?

Answer: Because of security issues, I wouldn't choose wireless transmission. The offices themselves can each

have an Ethernet-based LAN, and they can connect to each other and to an Intranet via a secure,

encrypted VPN over the Internet. Network hardware anticipated is: coaxial cable, network server, a

switch. Because the LANs will be connected through a VPN, a router may not be needed. In

anticipation of the need for a lot of data transmission, the connection to the Internet will be through

cable modems. A firewall, or several, for security purposes is anticipated.

163) You have been hired by a small new Web design firm to set up a network for its single office location. The

network is primarily needed for exchanging files, accessing and managing beta Web sites on their Web

server, and connecting to the Internet. The firm hires many freelancers who come into the office on an ad hoc

basis and it does not have a lot of money to spend on infrastructure. What type of network will you

recommend?

Answer: I would recommend a mixed Ethernet and wireless network. The Ethernet LAN would connect the

Web servers and primary workstations and connect via cable service to the Internet. Freelancers could

connect wirelessly via access points.

164) What types of capabilities does the Internet provide businesses and what Internet protocols or technologies

support these? Which have proven the most valuable to businesses thus far?

Answer: The Internet provides ways to transfer files (FTP), work on remote computers (Telnet), distribute

information in the form of pages (The Web), have real-time text-based conversations (instant

messaging, chat), collaborate (wikis), communicate and share data with suppliers (extranets,

Web-based applications), conduct group discussions (newsgroups), real-time voice conversations

(chat, VOIP), send text messages (e-mail) and create lower cost networks (TCP/IP, extranets, intranets,

VPN).

Probably the two most important effects the Internet has had are the effects on network costs

and ease of setting up a network using TCP/IP and Internet-based technologies, and e-mail, allowing

near-instant documented messaging. E-mail has been a valuable alternative to post office mail.

165) What are the business advantages of using voice over IP (VoIP) technology?

Answer: Business can lower costs by using the Internet to deliver voice information, avoiding the tolls charged

by local and long-distance telephone networks. They can lower costs from not having to create a

separate telephone network. VOIP enables communication by supporting Internet conference calls

using video. VOIP also provides flexibility - phones can be added or moved to different offices

without rewiring or reconfiguring the network.

166) Describe and explain the idea of "network neutrality." Are you in favour of network neutrality? Why or why

not?

Answer: Network neutrality describes the current equal access by users to Internet bandwidth, regardless of the

services they are using on the Internet. Network neutrality is the idea that Internet service providers

must allow customers equal access to content and applications, regardless of the source or nature of

the content. Presently, the Internet is indeed neutral: all Internet traffic is treated equally on a

first-come, first-serve basis by Internet backbone owners. The Internet is neutral because it was built

on phone lines, which are subject to ‘common carriage' laws. These laws require phone companies to

treat all calls and customers equally. For example, someone using the Internet to download large

movie files pays the same rate as someone accessing their e-mail. Now telecommunications and cable

companies want to be able to charge differentiated prices based on the amount of bandwidth

consumed by content being delivered over the Internet. Student opinions will vary; one might be: I

support network neutrality because the risk of censorship increases when network operators can

selectively block or slow access to certain content.

167) Describe the current trends and movements in Internet technology and content.

Answer: One upcoming change is the move to IPv6, a new addressing scheme that will allow for billions more

addresses. Other technological changes are being worked on by Internet2 and Next-Generation

Internet (NGI); consortia representing 200 universities, private businesses, and government agencies

in the United States that are working on a new, robust, high-bandwidth version of the Internet. A

current trend in Internet content is Web 2.0 Web 2.0, second-generation interactive Internet-based

services that enable people to collaborate, share information, and create new services online like

mashups, blogs, RSS, and wikis. With Web 2.0, the Web is not just a collection of destination sites but a

source of data and services that can be combined to create applications users need. Web 2.0 software

applications run on the Web itself instead of the desktop and bring the vision of Web-based

computing closer to realization. Another potential change or trend in Internet content is the Web 3.0 or

Semantic Web, a collaborative effort led by the World Wide Web Consortium to make Web searching

more efficient by reducing the amount of human involvement in searching for and processing Web

information. The Semantic Web is still in its infancy. Further development requires extensive work to

establish specific meanings for data on the Web, categories for classifying the data, and relationships

between classification categories. Once some of this work takes place, computers will be able to make

more sense of the Web, intelligent agents will be capable of performing sophisticated search tasks, and

data in Web pages will be able to be processed automatically. Another technological change can be

seen in the way the Internet is being accessed. Mobile wireless broadband Internet access is the

fastest-growing form of Internet access in 2008.

168) How are RFID systems used in inventory control and supply chain management?

Answer: In inventory control and supply chain management, RFID systems capture and manage more detailed

information about items in warehouses or in production than bar coding systems. If a large number of

items are shipped together, RFID systems track each pallet, lot, or even unit item in the shipment. This

technology may help companies improve receiving and storage operations by enhancing their ability

to "see" exactly what stock is stored in warehouses or on retail store shelves.

169) What are wireless sensor networks? How do they work and what are they used for?

Answer: Wireless sensor networks (WSNs) are networks of interconnected wireless devices that are embedded

into the physical environment to provide measurements of many points over large spaces. These

devices have built-in processing, storage, and radio frequency sensors and antennas. They are linked

into an interconnected network that routes the data they capture to a computer for analysis. These

networks range from hundreds to thousands of nodes. Because wireless sensor devices are placed in

the field for years at a time without any maintenance or human intervention, they must have very low

power requirements and batteries capable of lasting for years. Wireless sensor networks are valuable

in areas such as monitoring environmental changes; monitoring traffic or military activity; protecting

property; efficiently operating and managing machinery and vehicles; establishing security

perimeters; monitoring supply chain management; or detecting chemical, biological, or radiological

material.

1) TRUE

2) TRUE

3) TRUE

4) TRUE

5) TRUE

6) FALSE

7) FALSE

8) FALSE

9) FALSE

10) FALSE

11) FALSE

12) FALSE

13) FALSE

14) TRUE

15) TRUE

16) TRUE

17) TRUE

18) TRUE

19) TRUE

20) TRUE

21) FALSE

22) FALSE

23) TRUE

24) TRUE

25) TRUE

26) FALSE

27) FALSE

28) FALSE

29) TRUE

30) FALSE

31) FALSE

32) TRUE

33) FALSE

34) FALSE

35) TRUE

36) TRUE

37) FALSE

38) TRUE

39) TRUE

40) FALSE

41) FALSE

42) FALSE

43) FALSE

44) FALSE

45) FALSE

46) FALSE

47) A

48) C

49) B

50) A

51) C

52) C

53) D

54) B

55) B

56) C

57) B

58) A

59) D

60) B

61) B

62) B

63) C

64) B

65) D

66) B

67) C

68) C

69) A

70) A

71) B

72) C

73) B

74) B

75) C

76) B

77) B

78) A

79) D

80) A

81) A

82) A

83) B

84) C

85) D

86) C

87) B

88) B

89) A

90) D

91) D

92) C

93) C

94) A

95) A

96) A

97) D

98) D

99) A

100) D

101) A

102) C

103) B

104) A

105) A

106) A

107) D

108) A

109) C

110) C

111) B

112) network operating system

113) networks

114) deregulation

115) communication

116) network

117) network interface card (NIC)

118) client/server computing

119) efficient

120) protocol

121) protocols

122) TCP

123) delivery

124) Internet

125) analog signal

126) digital signal

127) modem

128) local-area network (LAN)

129) operating

130) Ethernet

131) peer-to-peer

132) bus topology

133) Wide-area networks (WANs)

134) metropolitan-area network (MAN)

135) Twisted wire

136) Coaxial cable

137) Fibre optic cable

138) bandwidth

139) Microwave

140) Internet service provider (ISP)

141) Digital subscriber line (DSL)

142) Cable Internet

143) domain name

144) Voice over IP (VoIP)

145) carries

146) retain

147) monitor

148) virtual private network (VPN)

149) packet switching

150) digital

151) Topology

152) Ethernet

153) Internet service provider

154) network service providers

155) Web server

156) access point

157) Packet switching is a method of slicing digital messages into parcels called packets, sending the packets along

different communication paths as they become available, and then reassembling the packets once they arrive at

their destinations. Packet switching makes much more efficient use of the communications capacity of a network

than did circuit-switching. In packet-switched networks, messages are first broken down into small fixed bundles of

data called packets. The packets include information for directing the packet to the right address and for checking

transmission errors along with the data. The packets are transmitted over various communications channels using

routers, each packet traveling independently. Packets of data originating at one source will be routed through many

different paths and networks before being reassembled into the original message when they reach their

destinations.

158) A simple network consists of two or more connected computers. Basic network components include computers,

network interfaces, a connection medium, network operating system software, and either a hub or a switch. The

networking infrastructure for a large company includes the traditional telephone system, mobile cellular

communication, wireless local-area networks, videoconferencing systems, a corporate Web site, intranets, extranets,

and an array of local and wide-area networks, including the Internet. Contemporary networks have been shaped by

the rise of client/server computing, the use of packet switching, and the adoption of Transmission Control

Protocol/Internet Protocol (TCP/IP) as a universal communications standard for linking disparate networks and

computers, including the Internet. Protocols provide a common set of rules that enable communication among

diverse components in a telecommunications network.

159) The principal physical transmission media are twisted copper telephone wire, coaxial copper cable, fibre optic

cable, and wireless transmission. Twisted wire enables companies to use existing wiring for telephone systems for

digital communication although it is relatively slow. Fibre optic and coaxial cable are used for high-volume

transmission but are expensive to install. Microwave and communications satellites are used for wireless

communication over long distances. Local-area networks (LANs) connect PCs and other digital devices together

within a 500-metre radius and are used today for many corporate computing tasks. Network components may be

connected together using a star, bus, or ring topology. Wide-area networks (WANs) span broad geographical

distances, ranging from several kilometres to continents, and are private networks that are independently managed.

Metropolitan-area networks (MANs) span a single urban area. Digital subscriber line (DSL) technologies, cable

Internet connections, and T1 lines are often used for high-capacity Internet connections. Cable Internet connections

provide high-speed access to the Web or corporate intranets at speeds of up to 10 Mbps. A T1 line supports a data

transmission rate of 1.544 Mbps.

160) Radio frequency identification (RFID) systems provide a powerful technology for tracking the movement of goods

by using tiny tags with embedded data about an item and its location. RFID readers read the radio signals

transmitted by these tags and pass the data over a network to a computer for processing. Wireless sensor networks

(WSNs) are networks of interconnected wireless sensing and transmitting devices that are embedded into the

physical environment to provide measurements of many points over large spaces.

161) The application layer enables client application programs to access the other layers and defines the protocols that

applications use to exchange data. One of these application protocols is the Hypertext Transfer Protocol (HTTP),

which is used to transfer Web page files. The transport layer is responsible for providing the application layer with

communication and packet services. This layer includes TCP and other protocols. The Internet layer is responsible

for addressing, routing, and packaging data packets called IP datagrams. The Internet Protocol is one of the

protocols used in this layer. At the bottom of the reference model, the network interface layer is responsible for

placing packets on and receiving them from the network medium, which could be any networking technology.

Data sent from one computer to the other passes downward through all four layers, starting with the sending

computer's application layer and passing through the network interface layer. After the data reach the recipient

host computer, they travel up the layers and are reassembled into a format the receiving computer can use. If the

receiving computer finds a damaged packet, it asks the sending computer to retransmit it. This process is reversed

when the receiving computer responds.

162) Because of security issues, I wouldn't choose wireless transmission. The offices themselves can each have an

Ethernet-based LAN, and they can connect to each other and to an Intranet via a secure, encrypted VPN over the

Internet. Network hardware anticipated is: coaxial cable, network server, a switch. Because the LANs will be

connected through a VPN, a router may not be needed. In anticipation of the need for a lot of data transmission, the

conn ection to the Internet will be through cable modems. A firewall, or several, for security purposes is anticipated.

163) I would recommend a mixed Ethernet and wireless network. The Ethernet LAN would connect the Web servers

and primary workstations and connect via cable service to the Internet. Freelancers could connect wirelessly via

access points.

164) The Internet provides ways to transfer files (FTP), work on remote computers (Telnet), distribute information in the

form of pages (The Web), have real-time text-based conversations (instant messaging, chat), collaborate (wikis),

communicate and share data with suppliers (extranets, Web-based applications), conduct group discussions

(newsgroups), real-time voice conversations (chat, VOIP), send text messages (e-mail) and create lower cost

networks (TCP/IP, extranets, intranets, VPN).

Probably the two most important effects the Internet has had are the effects on network costs and ease of

setting up a network using TCP/IP and Internet-based technologies, and e-mail, allowing near-instant documented

messaging. E-mail has been a valuable alternative to post office mail.

165) Business can lower costs by using the Internet to deliver voice information, avoiding the tolls charged by local and

long-distance telephone networks. They can lower costs from not having to create a separate telephone network.

VOIP enables communication by supporting Internet conference calls using video. VOIP also provides flexibility -

phones can be added or moved to different offices without rewiring or reconfiguring the network.

166) Network neutrality describes the current equal access by users to Internet bandwidth, regardless of the services

they are using on the Internet. Network neutrality is the idea that Internet service providers must allow customers

equal access to content and applications, regardless of the source or nature of the content. Presently, the Internet is

indeed neutral: all Internet traffic is treated equally on a first-come, first-serve basis by Internet backbone owners.

The Internet is neutral because it was built on phone lines, which are subject to ‘common carriage' laws. These laws

require phone companies to treat all calls and customers equally. For example, someone using the Internet to

download large movie files pays the same rate as someone accessing their e-mail. Now telecommunications and

cable companies want to be able to charge differentiated prices based on the amount of bandwidth consumed by

content being delivered over the Internet. Student opinions will vary; one might be: I support network neutrality

because the risk of censorship increases when network operators can selectively block or slow access to certain

content.

167) One upcoming change is the move to IPv6, a new addressing scheme that will allow for billions more addresses.

Other technological changes are being worked on by Internet2 and Next-Generation Internet (NGI); consortia

representing 200 universities, private businesses, and government agencies in the United States that are working on

a new, robust, high-bandwidth version of the Internet. A current trend in Internet content is Web 2.0 Web 2.0,

second-generation interactive Internet-based services that enable people to collaborate, share information, and

create new services online like mashups, blogs, RSS, and wikis. With Web 2.0, the Web is not just a collection of

destination sites but a source of data and services that can be combined to create applications users need. Web 2.0

software applications run on the Web itself instead of the desktop and bring the vision of Web-based computing

closer to realization. Another potential change or trend in Internet content is the Web 3.0 or Semantic Web, a

collaborative effort led by the World Wide Web Consortium to make Web searching more efficient by reducing the

amount of human involvement in searching for and processing Web information. The Semantic Web is still in its

infancy. Further development requires extensive work to establish specific meanings for data on the Web,

categories for classifying the data, and relationships between classification categories. Once some of this work takes

place, computers will be able to make more sense of the Web, intelligent agents will be capable of performing

sophisticated search tasks, and data in Web pages will be able to be processed automatically. Another technological

change can be seen in the way the Internet is being accessed. Mobile wireless broadband Internet access is the

fastest-growing form of Internet access in 2008.

168) In inventory control and supply chain management, RFID systems capture and manage more detailed information

about items in warehouses or in production than bar coding systems. If a large number of items are shipped

together, RFID systems track each pallet, lot, or even unit item in the shipment. This technology may help

companies improve receiving and storage operations by enhancing their ability to "see" exactly what stock is stored

in warehouses or on retail store shelves.

169) Wireless sensor networks (WSNs) are networks of interconnected wireless devices that are embedded into the

physical environment to provide measurements of many points over large spaces. These devices have built-in

processing, storage, and radio frequency sensors and antennas. They are linked into an interconnected network that

route

s the

data

they

capt

ure

to a

com

pute

r for

anal

ysis.

Thes

e

netw

orks

rang

e

from

hund

reds

to

thou

sand

s of

node

s.

Beca

use

wirel

ess

sens

or

devic

es

are

place

d in

the

field

for

years

at a

time

with

out

any

main

tena

nce

or

hum

an intervention, they must have very low power requirements and batteries capable of lasting for years. Wireless

sensor networks are valuable in areas such as monitoring environmental changes; monitoring traffic or military

activity; protecting property; efficiently operating and managing machinery and vehicles; establishing security

perimeters; monitoring supply chain management; or detecting chemical, biological, or radiological material.