Filters
Question type

Study Flashcards

A proxy is software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons.

A) True
B) False

Correct Answer

verifed

verified

What is an access point (AP) ?


A) the computer or network device that serves as an interface between devices and the network
B) refers to any type of operation accomplished without the use of a hard-wired connection
C) a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices
D) provides communication for devices owned by a single user that work over a short distance

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

A geocoin, a round coin-sized object, is uniquely numbered and hidden in geocache.Geocoins can also be shaped to match a theme like the state of Colorado or a birthday party hat.Geocoins are often decorative or commemorative, making them collectible and highly valuable for technology adventures.

A) True
B) False

Correct Answer

verifed

verified

The network access technologies include DSL, cable modem, and broadband.

A) True
B) False

Correct Answer

verifed

verified

Dynamic host configuration protocol is a utility application that monitors the network path of packet data sent to a remote computer.

A) True
B) False

Correct Answer

verifed

verified

Hotspots are designated locations where Wi-Fi access points are publicly available.

A) True
B) False

Correct Answer

verifed

verified

What is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server?


A) peer-to-peer (P2P)
B) voice over IP (VoIP)
C) Internet protocol TV (IPTV)
D) All of these are correct.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

GIS map automation links business assets to a centralized system where they can be tracked and monitored over time.

A) True
B) False

Correct Answer

verifed

verified

Attenuation is a single unit of binary data routed through a network.

A) True
B) False

Correct Answer

verifed

verified

Wired equivalent privacy (WEP) is an encryption algorithm designed to protect wireless transmission data.

A) True
B) False

Correct Answer

verifed

verified

An extranet is not available for use by a ________.


A) customer
B) supplier
C) employee
D) competitor

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

What spans a large geographic area such as a state, province, or country, similar to the Internet?


A) metropolitan area network (MAN)
B) local area network (LAN)
C) wide area network (WAN)
D) secure area network (SAN)

E) All of the above
F) None of the above

Correct Answer

verifed

verified

What is the major challenge of networking or performing business in a connected world?


A) personal issues
B) society demands
C) security issues
D) telecommuting demands

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

An intranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, web publishing, and the support of business processes.

A) True
B) False

Correct Answer

verifed

verified

Estimated time of arrival (ETA) is the time of day of an expected arrival at a certain destination and is typically used for navigation applications.

A) True
B) False

Correct Answer

verifed

verified

What are the five elements that are needed to create a connected world or a network?


A) categories, programs, alternatives, people, and core philosophy
B) program, providers, access, mechanics, and teachers
C) categories, providers, access technologies, protocols, and convergence
D) LAN, WAN, MAN, PAN, and SAN

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Which tags have their own transmitter and a power source (typically a battery) ?


A) active RFID
B) semi-passive RFID
C) RFID accelerometer
D) chipless RFID

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Which of the choices below offers an example of a WAN?


A) the Internet
B) Microsoft's main campus in Washington
C) the city of Denver's court and police departments
D) All of these are correct.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What uses GPS tracking to track vehicles?


A) automatic vehicle location
B) geographic information system
C) cartography

D) None of the above
E) B) and C)

Correct Answer

verifed

verified

VPNs are often used to connect to a corporate server.VPN stands for a Valued Partner Network.

A) True
B) False

Correct Answer

verifed

verified

Showing 81 - 100 of 303

Related Exams

Show Answer