Filters
Question type

Study Flashcards

Estimated-time-enroute (ETE)is the time remaining before reaching a destination using the present speed and is typically used for navigation applications.

A) True
B) False

Correct Answer

verifed

verified

Which of the following allows high-speed digital data transmission over standard telephone lines?


A) Digital subscriber line (DSL)
B) Data subscription service (DSS)
C) Dominance service line (DSL)
D) Data converter input (DCI)

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

The three main benefits of networks or a connected world include sharing resources,providing opportunities,and reducing travel.

A) True
B) False

Correct Answer

verifed

verified

The potential for contracting viruses on mobile devices is increasing;in fact,the first known mobile phone virus was called ______________.


A) Cabir
B) Cadet
C) Capital
D) Caviar

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Secure socket ____________ is a standard security technology for establishing an encrypted link between a Web server and a browser,ensuring that all data passed between them remain private.

Correct Answer

verifed

verified

What is the worldwide gap giving advantage to those with access to technology?


A) Digital subscriber
B) Digital divide
C) Digital Darwinism
D) Digital era

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

One of the main benefits of business mobility is enhancing _____________,which gives a company the power to place the right resources in the right place at the right time.

Correct Answer

verifed

verified

Which business application is a satellite-based navigation system providing extremely accurate position,time,and speed information?


A) Radio-frequency identification
B) Global positioning systems
C) Geographic information systems
D) Location-based services

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Network convergence is the integration of communication channels into a single service.

A) True
B) False

Correct Answer

verifed

verified

A global positioning system (GPS)consists of hardware,software,and data that provide location information for display on a multidimensional map.

A) True
B) False

Correct Answer

verifed

verified

Which tags have their own transmitter and a power source (typically a battery) ?


A) Active RFID
B) Semi-passive RFID
C) RFID Accelerometer
D) Chipless RFID

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What are the two most prevalent types of broadband access?


A) Data subscriber and cable connection
B) Digital subscriber line and cable connection
C) Digital line and client line
D) Digital server and client server

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What is deliberately searching for Wi-Fi signals while driving by in a vehicle?


A) WEP
B) Wi-Fi protected access
C) War chalking
D) War driving

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

_________ tracking occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items location with little or no manual intervention.

Correct Answer

verifed

verified

Which of the following provides Internet access using a cable television company's infrastructure and a special cable modem?


A) ISP cable box
B) Internet cable connection
C) Satellite cable box
D) Satellite cable connection

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

What is the time of day of an expected arrival at a certain destination and is typically used for navigation applications?


A) Estimated-time-of-arrival
B) Estimated-time-enroute
C) Latitude
D) Longitude

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Some of the social challenges with networking occur with newsgroups or blogs where like-minded people can exchange messages.Problems can arise when sensitive social issues become the topic of discussion such as politics or religion.

A) True
B) False

Correct Answer

verifed

verified

__________ directly impact network performance and reliability by subdividing an electronic message into smaller more manageable packets.

Correct Answer

verifed

verified

What is an encryption algorithm designed to protect wireless transmission data?


A) WEP
B) Wi-Fi protected access
C) War chalking
D) War driving

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

An extranet is not available for use by a _______________.


A) Customer
B) Supplier
C) Employee
D) Competitor

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Showing 101 - 120 of 268

Related Exams

Show Answer