Filters
Question type

Study Flashcards

Mobile application management (MAM) remotely controls smart phones and tablets, ensuring data security.

A) True
B) False

Correct Answer

verifed

verified

Packets directly impact network performance and reliability by subdividing an electronic message into smaller more manageable packets.

A) True
B) False

Correct Answer

verifed

verified

A voice over LTE is the computer or network device that serves as an interface between devices and the network.Each computer initially connects to the access point and then to other computers on the network.

A) True
B) False

Correct Answer

verifed

verified

A wireless LAN (WLAN) is a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet.

A) True
B) False

Correct Answer

verifed

verified

Which of the following include the three primary network providers?


A) DSL, Cable Modem, Broadband
B) LAN, WAN, MAN
C) VoIP, UC, IPTV
D) ISP, NSP, RSP

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which business application uses electronic tags and labels to identify objects wirelessly over short distances?


A) radio-frequency identification
B) global positioning systems
C) geographic information systems
D) location-based services

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

A repeater represents the loss of a network signal strength measured in decibels and occurs because the transmissions gradually dissipate in strength over longer distances or radio interference or physical obstructions like walls also impact communication signals.

A) True
B) False

Correct Answer

verifed

verified

What is the conversion of IP addresses that identifies labels that use a variety of recognizable naming conventions?


A) domain grades
B) URL spaces
C) domain national sequences (DNS)
D) domain name system (DNS)

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

LBS differ from RFID in that an LBS cannot track and monitor objects such as inventory.

A) True
B) False

Correct Answer

verifed

verified

Wi-Fi protected access (WPA) a wireless security protocol to protect Wi-Fi networks.

A) True
B) False

Correct Answer

verifed

verified

What represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or because of radio interference or physical obstructions such as walls?


A) traceroute
B) attenuation
C) repeater
D) packet footer

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

What is an extension of an intranet that is available only to authorized outsiders?


A) national ISP
B) regional ISP
C) intranet
D) extranet

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Passive RFID tags have their own transmitter and a power source (typically a battery).

A) True
B) False

Correct Answer

verifed

verified

What is war chalking?


A) allows mobile voice calls to be made over broadband networks, creating-under the right network conditions-clearer audio and fewer dropped calls
B) the practice of tagging pavement with codes displaying where Wi-Fi access is available
C) deliberately searching for Wi-Fi signals while driving by in a vehicle
D) remotely controls smart phones and tablets, ensuring data security

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Which domain is reserved for accredited postsecondary institutions?


A) .mil
B) .edu
C) .biz
D) .org

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

What is a packet footer?


A) a single unit of binary data routed through a network
B) lists the destination (for example, in IP packets the destination is the IP address) along with the length of the message data
C) represents the end of the packet or transmission end
D) a utility application that monitors the network path of packet data sent to a remote computer

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

A wide area network (WAN) spans a large geographic area such as a state, province, or country.

A) True
B) False

Correct Answer

verifed

verified

Voice over IP (VoIP) uses IP technology to transmit telephone calls.

A) True
B) False

Correct Answer

verifed

verified

A metropolitan area network (MAN) is a large computer network usually spanning a city.

A) True
B) False

Correct Answer

verifed

verified

What is software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons?


A) proxy
B) broadband over power line
C) attenuation
D) repeater

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Showing 201 - 220 of 303

Related Exams

Show Answer