Filters
Question type

Study Flashcards

What is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, and web publishing?


A) National ISP
B) Regional ISP
C) Intranet
D) Extranet

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

________ is a security protocol that protects wi-fi networks.


A) Wireless prevention policy
B) Wi-fi protected access
C) Wireless security regulations
D) Wi-fi technology port

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Which of the following is experiencing rapid growth due to wireless technology?


A) RFID
B) GPS
C) GIS
D) All of these

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Which of the following is a type of data connection able to transmit a digital signal at 1.544 Mpbs and is more expensive and reliable than cable or DSL?


A) T1 line
B) Dial-up line
C) Modem line
D) All of these

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

The largest and most important network, the ______________, is like a network made up of millions of smaller networks able to operate independently.

Correct Answer

verifed

verified

Which of the following allows high-speed digital data transmission over standard telephone lines?


A) Digital subscriber line (DSL)
B) Data subscription service (DSS)
C) Dominance service line (DSL)
D) Data converter input (DCI)

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Secure socket ____________ is a standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remain private.

Correct Answer

verifed

verified

Why would a company use an intranet?


A) Intranets are used for business operations and management.
B) Intranets are used for communications and collaboration.
C) Intranets are used for Web publishing.
D) All of these.

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Which of the following statements is not accurate in reference to mobile and wireless computing?


A) Mobile technology can travel with the user.
B) Wireless technology is any type of operation accomplished without the use of a hard-wired connection.
C) Wireless technology is any type of operation accomplished with the use of a hard-wired connection.
D) Mobile technology allows a user to download software to a laptop or cell phone for portable reading or reference.

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

What is a high-speed Internet connection that is always connected and has a bandwidth greater than 2 Mbps?


A) Analog
B) Dial up
C) Broadband
D) None of these

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

One of the main challenges of business mobility is protecting against theft.

A) True
B) False

Correct Answer

verifed

verified

Secure sockets layer (SSL) is a combination of HTTP and SSL to provide encryption and secure identification of an Internet server.

A) True
B) False

Correct Answer

verifed

verified

What does the wireless technology WiMAX stand for?


A) Worldwide interoperability for microwave access
B) World interconnected through mobile awareness
C) World interorganizations for mobile access
D) Wide international for misinformation access

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What distributes digital video content using IP across the Internet and private IP networks?


A) Internet broadband policy network
B) Internet protocol TV (IPTV)
C) Internet Television Interactivity (ITVI)
D) Internet television personalization

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

What are satellite communications used for?


A) Cell phones
B) Mobile base stations
C) Satellite dish receivers
D) All of these

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

What is a device that enables a computer to transmit and receive data?


A) Broadband
B) Modem
C) Bandwidth
D) ISP

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

To create an SSL connection, a web server requires an SSL _____________, an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company.

Correct Answer

verifed

verified

What are the two main methods for encrypting network traffic on the web?


A) SSL and HTTP
B) SSL and SHTTP
C) DSL and HTTP
D) HTML and SHTTP

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Mobile and wireless networks are identical, and the terms can be used synonymously.

A) True
B) False

Correct Answer

verifed

verified

Some of the social challenges with networking occur with newsgroups or blogs where like-minded people can exchange messages.Problems can arise when sensitive social issues become the topic of discussion such as politics or religion.

A) True
B) False

Correct Answer

verifed

verified

Showing 81 - 100 of 145

Related Exams

Show Answer