The device that acts as a connection point between computers and can filter and
forward data to a specified destination is called a(n): - ANSWER-switch.
The Internet is based on which three key technologies? - ANSWER-Client/server
computing, packet switching, and the development of communications standards
for linking networks and computers
The method of slicing digital messages into parcels, transmitting them along
different communication paths, and reassembling them at their destinations is
called: - ANSWER-packet switching.
In TCP/IP, IP is responsible for: - ANSWER-disassembling and reassembling of
packets during transmission.
In a telecommunications network architecture, a protocol is: - ANSWER-a
standard set of rules and procedures for control of communications in a network.
Which type of network serves a small group of computers, allowing them to share
resources and peripherals without using a dedicated server? - ANSWER-Peer-to-
peer
Which of the following is considered by many to be the defining Web 2.0
application? - ANSWER-Social networking
Which of the following enables multiple users to create and edit Web documents?
- ANSWER-Wiki
, A network that covers entire geographical regions is most commonly referred to
as a(n): - ANSWER-wide area network.
Which of the following is a challenge posed by Wi-Fi networks? - ANSWER-
Susceptibility to interference from nearby wireless systems
T lines: - ANSWER-are high-speed, leased data lines providing guaranteed
service levels.
Which protocol is the Internet based on? - ANSWER-TCP/IP
What service converts IP addresses into more recognizable alphanumeric
names? - ANSWER-DNS
IPv6 is being developed in order to: - ANSWER-create more IP addresses.
Which of the following statements about RFID is not true? - ANSWER-RFIDs
require line-of-sight contact to be read.
________ integrate(s. disparate channels for voice communications, data
communications, instant messaging, e-mail, and electronic conferencing into a
single experience. - ANSWER-Unified communications
A VPN: - ANSWER-is an encrypted private network configured within a public
network.
The most common Web server today, controlling 65 percent of the market, is: -
ANSWER-Apache HTTP Server.
Which of the following statements is not true about search engines? - ANSWER-
There are hundreds of search engines vying for user attention, with no clear
leader having yet emerged.
Which of the following is an example of the "visual Web"? - ANSWER-Pinterest
Which process is used to protect transmitted data in a VPN? - ANSWER-
Tunneling
The 802.11 set of standards is known as: - ANSWER-Wi-Fi.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller tuition. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.99. You're not tied to anything after your purchase.