Filters
Question type

Study Flashcards

War driving allows mobile voice calls to be made over broadband networks, creating-under the right network conditions-clearer audio and fewer dropped calls.

A) True
B) False

Correct Answer

verifed

verified

WiMAX is a coding process that takes a digital map feature and assigns it an attribute that serves as a unique ID (tract number, node number)or classification (soil type, zoning category). GIS professionals are certified in geocoding practices to ensure industry standards are met when classifying spatial data.

A) True
B) False

Correct Answer

verifed

verified

What is cartography?


A) An east/west measurement of position.
B) The science and art of making an illustrated map or chart.
C) Stores, views, and analyzes geographic data, creating multidimensional charts or maps.
D) A round coin-sized object, is uniquely numbered and hidden in geocache.

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

What is the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures?


A) Network protocol
B) Networking category
C) Network convergence
D) Network communication

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following are the three primary network categories?


A) LAN, WAN, SAN
B) LAN, WAN, MAN
C) LAN, SAN, XAN
D) LAN, WAN, XAN

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

What is a combination of HTTP and SSL that provides encryption and secure identification of an Internet server?


A) Secure hypertext transfer protocol (SHTTP)
B) Secure sockets layer (SSL)
C) SSL certificate
D) SHTTP certificate

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Peer-to-peer (P2P)is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server.

A) True
B) False

Correct Answer

verifed

verified

What is transmission control protocol/Internet protocol (TCP/IP) ?


A) Software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons.
B) A standard that specifies the format of data as well as the rules to be followed during transmission.
C) A simple network protocol that allows the transfer of files between two computers on the Internet.
D) A standard Internet protocol that provides the technical foundation for the public Internet as well as for large numbers of private networks.

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

What allows users to work from remote locations such as home or hotel using high-speed Internet to access business applications and data?


A) Telecommuting
B) Repeater
C) Packet header
D) Virtual attenuation

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

IT consumerization is the blending of personal and business use of technology devices and applications.

A) True
B) False

Correct Answer

verifed

verified

What is wireless?


A) Means the technology can travel with the user; for instance, users can download software, email messages, and web pages onto a laptop or other mobile device
B) Refers to any type of operation accomplished without the use of a hard-wired connection.
C) A wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices
D) Provides communication for devices owned by a single user that work over a short distance.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the below is an example of P2P?


A) GoDaddy
B) Skype
C) Federal Communication Commission (FCC)
D) Facebook

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

VoIP allows users to ________.


A) Call anyone with a local telephone number
B) Call anyone with an international telephone number
C) Call anyone with a cellular telephone number
D) All of the above

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

The network access technologies include VoIP, UC, and IPTV.

A) True
B) False

Correct Answer

verifed

verified

A proxy is software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not a type of wireless network?


A) PAN
B) WLAN
C) WWAN
D) MAN

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

The network protocols include TCP/IP, FTP, and DHCP.

A) True
B) False

Correct Answer

verifed

verified

What receives and repeats a signal extending its attenuation or range?


A) Proxy
B) Broadband over power line
C) Attenuation
D) Repeater

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

What is a large computer network usually spanning a city or a specific infrastructure like a college?


A) Metropolitan area network (MAN)
B) Local area network (LAN)
C) Wide area network (WAN)
D) Secure area network (SAN)

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

A wireless MAN (WMAN) is a metropolitan area network that uses ________ to transmit and receive data?


A) WI-FI ideas
B) STP technology
C) Cable connections
D) Radio signals

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Showing 281 - 300 of 303

Related Exams

Show Answer