0% found this document useful (0 votes)
0 views29 pages

Bank 6

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 29

Management Information Systems, 17e (Laudon/Laudon)

Chapter 7 Telecommunications, the Internet, and Wireless Technology

1) Which of the following is a device that sends packets of data through different networks
ensuring they go to the correct address?
A) Hub
B) Switch
C) Router
D) NIC
E) Modem
Answer: C
Difficulty: Easy
AACSB: Information technology
LO: 7-1: What are the principal components of telecommunications networks and key
networking technologies?

2) The Internet is based on which three key technologies?


A) TCP/IP, HTML, and HTTP
B) TCP/IP, HTTP, and packet switching
C) Client/server computing, packet switching, and the development of communications standards
for linking networks and computers
D) Client/server computing, packet switching, and HTTP
E) Email, instant messaging, and newsgroups
Answer: C
Difficulty: Moderate
AACSB: Information technology
LO: 7-1: What are the principal components of telecommunications networks and key
networking technologies?

3) Which of the following involves slicing digital messages into parcels, transmitting them along
different communication paths, and reassembling them at their destinations?
A) Multiplexing
B) Packet shifting
C) Packet routing
D) ATM
E) Packet switching
Answer: E
Difficulty: Easy
AACSB: Information technology
LO: 7-1: What are the principal components of telecommunications networks and key
networking technologies?

1
4) The traditional telephone system is an example of a ________ network.
A) peer-to-peer
B) wireless
C) packet-switched
D) circuit-switched
E) client/server
Answer: D
Difficulty: Easy
AACSB: Information technology
LO: 7-1: What are the principal components of telecommunications networks and key
networking technologies?

5) Which of the following is not a characteristic of packet switching?


A) Packets travel independently of each other.
B) Packets are routed through many different paths.
C) Packet switching requires point-to-point circuits.
D) Packets include data for checking transmission errors.
E) Packets are reassembled into the original message when they reach their destinations.
Answer: C
Difficulty: Moderate
AACSB: Information technology
LO: 7-1: What are the principal components of telecommunications networks and key
networking technologies?

6) In TCP/IP, IP is responsible for which of the following?


A) Disassembling and reassembling packets during transmission
B) Establishing an Internet connection between two computers
C) Moving packets over the network
D) Sequencing the transfer of packets
E) Breaking messages down into packets
Answer: A
Difficulty: Challenging
AACSB: Information technology
LO: 7-1: What are the principal components of telecommunications networks and key
networking technologies?

2
7) Which of the following is the best description of a protocol in a telecommunications network
architecture?
A) A device that handles the switching of voice and data in a local area network
B) A standard set of rules and procedures for control of communications in a network
C) A communications service for microcomputer users
D) The main computer in a telecommunications network
E) A pathway through which packets are routed
Answer: B
Difficulty: Moderate
AACSB: Information technology
LO: 7-1: What are the principal components of telecommunications networks and key
networking technologies?

8) What are the four layers of the TCP/IP reference model?


A) Physical, Application, Transport, and Network Interface
B) Physical, Application, Internet, and Network Interface
C) Application, Transport, Internet, and Network Interface
D) Application, Hardware, Internet, and Network Interface
E) Software, Hardware, Network Interface, Internet
Answer: C
Difficulty: Challenging
AACSB: Information technology
LO: 7-1: What are the principal components of telecommunications networks and key
networking technologies?

9) Each computer on a network must contain which of the following?


A) network interface device
B) switch
C) router
D) hub
E) SDN
Answer: A
Difficulty: Easy
AACSB: Information technology
LO: 7-1: What are the principal components of telecommunications networks and key
networking technologies?

3
10) Client/server computing is a:
A) network that connects sensors to desktop computers.
B) network where centralized mainframe computers serve local devices.
C) centralized model of computing for large corporations.
D) distributed computing model where clients are linked to one another through a network that is
controlled by a network server computer.
E) centralized computing model where local computers are connected to one another by a
network.
Answer: D
Difficulty: Moderate
AACSB: Information technology
LO: 7-1: What are the principal components of telecommunications networks and key
networking technologies?

11) Computer networks are based on the same principles as traditional telephone networks.
Answer: FALSE
Difficulty: Easy
AACSB: Information technology
LO: 7-1: What are the principal components of telecommunications networks and key
networking technologies?

12) A NOS must reside on all the local computers in a network.


Answer: FALSE
Difficulty: Moderate
AACSB: Information technology
LO: 7-1: What are the principal components of telecommunications networks and key
networking technologies?

13) A hub is a networking device that sends packets of data to all other devices on the network.
Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
LO: 7-1: What are the principal components of telecommunications networks and key
networking technologies?

14) In a client/server network, the client sets the rules of communication for the network.
Answer: FALSE
Difficulty: Moderate
AACSB: Information technology
LO: 7-1: What are the principal components of telecommunications networks and key
networking technologies?

4
15) A computer network consists of at least three computers.
Answer: FALSE
Difficulty: Moderate
AACSB: Information technology
LO: 7-1: What are the principal components of telecommunications networks and key
networking technologies?

16) Client/server computing has largely replaced centralized mainframe computing.


Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
LO: 7-1: What are the principal components of telecommunications networks and key
networking technologies?

17) Computer networks that use packet switching are less efficient than telephone networks that
use circuit switching.
Answer: FALSE
Difficulty: Easy
AACSB: Information technology
LO: 7-1: What are the principal components of telecommunications networks and key
networking technologies?

18) Two computers using TCP/IP can communicate even if they are based on different hardware
and software platforms.
Answer: TRUE
Difficulty: Easy
AACSB: Information technology
LO: 7-1: What are the principal components of telecommunications networks and key
networking technologies?

19) In a large company today, you will often find an infrastructure that includes a large number
of small LANs linked to each other as well as to corporate-wide networks.
Answer: TRUE
Difficulty: Easy
AACSB: Information technology
LO: 7-1: What are the principal components of telecommunications networks and key
networking technologies?

20) The Internet is the largest implementation of client/server computing.


Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
LO: 7-1: What are the principal components of telecommunications networks and key
networking technologies?

5
21) How does packet switching work?
Answer: Packet switching is a method of slicing digital messages into parcels called packets,
sending the packets along different communication paths as they become available, and then
reassembling the packets once they arrive at their destinations. Packet switching makes much
more efficient use of the communications capacity of a network than did circuit-switching. In
packet-switched networks, messages are first broken down into small, fixed bundles of data
called packets. The packets include information for directing the packet to the right address and
for checking transmission errors along with the data. The packets are transmitted over various
communication channels using routers, each packet traveling independently. Packets of data
originating at one source will be routed through many different paths and networks before being
reassembled into the original message when they reach their destinations.
Difficulty: Moderate
AACSB: Application of knowledge; Information technology; Written and oral communication
LO: 7-1: What are the principal components of telecommunications networks and key
networking technologies?

22) Identify the layers of the Department of Defense reference model for TCP/IP and describe
how this model works.
Answer: The application layer enables client application programs to access the other layers and
defines the protocols that applications use to exchange data. One of these application protocols is
the Hypertext Transfer Protocol (HTTP), which is used to transfer web page files. The transport
layer is responsible for providing the application layer with communication and packet services.
This layer includes TCP and other protocols. The Internet layer is responsible for addressing,
routing, and packaging data packets called IP datagrams. The Internet Protocol is one of the
protocols used in this layer. The network interface layer is responsible for placing packets on and
receiving them from the network medium, which could be any networking technology.
Data sent from one computer to the other passes downward through all four layers, starting with
the sending computer's application layer and passing through the network interface layer. After
the data reach the recipient host computer, they travel up the layers and are reassembled into a
format the receiving computer can use. If the receiving computer finds a damaged packet, it asks
the sending computer to retransmit it. This process is reversed when the receiving computer
responds.
Difficulty: Challenging
AACSB: Application of knowledge; Information technology; Written and oral communication
LO: 7-1: What are the principal components of telecommunications networks and key
networking technologies?

6
23) How are modern telephone and computer networks different from what firms used in the
past?
Answer: Modern telephone and computer networks are converging into a single digital network
using shared Internet-based standards and technology. Telecommunications providers such as
AT&T and Verizon offer data transmission, Internet access, mobile phone service, and television
programming as well as voice service. Computer networks have expanded to include Internet
telephone and video services. . In the past, these two types of networks were distinct–telephone
networks and computer networks performed completely different services and were not affiliated
with one another. Additionally, both voice and data communication networks have also become
more powerful (faster), more portable (smaller and mobile), and less expensive. Voice and data
communication, as well as Internet access, are increasingly taking place over broadband wireless
platforms such as mobile phones, mobile handheld devices, and PCs in wireless networks.
Difficulty: Challenging
AACSB: Application of knowledge; Information technology; Written and oral communication
LO: 7-1: What are the principal components of telecommunications networks and key
networking technologies?

24) Which signal types are represented by a continuous waveform?


A) Laser
B) Optical
C) Digital
D) RFID
E) Analog
Answer: E
Difficulty: Moderate
AACSB: Information technology
LO: 7-2: What are the different types of networks?

25) Which of the following is a device that makes possible the translation of digital signals to
analog sound signals used by a computer network?
A) Local area network
B) Modem
C) DSL
D) Twisted wire
E) TCP/IP
Answer: B
Difficulty: Easy
AACSB: Information technology
LO: 7-2: What are the different types of networks?

7
26) Which type of network is used to connect digital devices within a city or metropolitan area?
A) Wi-Fi
B) LAN
C) WAN
D) MAN
E) SAN
Answer: D
Difficulty: Moderate
AACSB: Information technology
LO: 7-2: What are the different types of networks?

27) Which type of network treats all processors equally and allows peripheral devices to be
shared without going to a separate server?
A) MAN
B) Wireless
C) LAN
D) Windows domain network
E) Peer-to-peer
Answer: E
Difficulty: Moderate
AACSB: Information technology
LO: 7-2: What are the different types of networks?

28) Which type of network would be most appropriate for a business comprised of three
employees and a manager located in the same office space, whose primary need is to share
documents?
A) MAN
B) Domain-based LAN
C) Peer-to-peer network
D) WAN
E) SAN
Answer: C
Difficulty: Moderate
AACSB: Analytical thinking
LO: 7-2: What are the different types of networks?

29) A network that spans a college or corporate facility is called a:


A) CAN.
B) MAN.
C) LAN.
D) WAN.
E) WSN.
Answer: A
Difficulty: Easy
AACSB: Information technology
LO: 7-2: What are the different types of networks?

8
30) A network that covers entire geographical regions is most commonly referred to as a(n):
A) local area network.
B) intranet.
C) peer-to-peer network.
D) wide area network.
E) metropolitan area network.
Answer: D
Difficulty: Easy
AACSB: Information technology
LO: 7-2: What are the different types of networks?

31) Bandwidth is the:


A) number of frequencies that can be broadcast through a medium.
B) number of cycles per second that can be sent through a medium.
C) difference between the highest and lowest frequencies that can be accommodated on a single
channel.
D) total number of bytes that can be sent through a medium per second.
E) geographical distance spanned by a network.
Answer: C
Difficulty: Moderate
AACSB: Information technology
LO: 7-2: What are the different types of networks?

32) The total amount of digital information that can be transmitted through any
telecommunications medium is measured in:
A) bps.
B) Hertz.
C) baud.
D) gigaflops.
E) RPMs.
Answer: A
Difficulty: Moderate
AACSB: Information technology
LO: 7-2: What are the different types of networks?

33) A(n) ________ signal is a discrete, binary waveform that transmits data coded into two
discrete states: 1-bits and 0-bits.
A) modulated
B) broadband
C) T1
D) analog
E) digital
Answer: E
Difficulty: Moderate
AACSB: Information technology
LO: 7-2: What are the different types of networks?

9
34) Coaxial cable is similar to that used for cable television and consists of thickly insulated
copper wire.
Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
LO: 7-2: What are the different types of networks?

35) Fiber-optic cable is more expensive and harder to install than other physical transmission
media.
Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
LO: 7-2: What are the different types of networks?

36) The Internet is the most universal and powerful WAN.


Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
LO: 7-2: What are the different types of networks?

37) You have been hired by a small new web design firm to set up a network for its single office
location. The network is primarily needed for exchanging files, accessing and managing beta
websites on the firm's web server, and connecting to the Internet. The firm hires many
freelancers who come into the office on an ad-hoc basis and it does not have a lot of money to
spend on infrastructure. What type of network will you recommend?
Answer: Student answers will vary. An example answer is: I would recommend a mixed wired
and wireless network. A wired local area network (LAN) with a dedicated network server would
connect the firm's computers and provide users with access to shared computing resources in the
network, including software programs, data files and the firm's web server. A router on the LAN
would enable it to also connect via cable or DSL service to the Internet. Freelancers could
connect wirelessly via access points.
Difficulty: Challenging
AACSB: Analytical thinking; Information technology; Written and oral communication
LO: 7-2: What are the different types of networks?

38) What are the two types of signals used to communicate a message in a network and how are
they different? What device converts one type to the other type?
Answer: The two ways to communicate a message in a network are analog signals and digital
signals. An analog signal is represented by a continuous waveform that passes through a
communications medium and is used for voice communication. Examples include the telephone
handset and other types of speakers that generate analog sound. On the other hand, digital signals
are binary waveforms (not continuous) that communicate information as strings of two discrete
states: one bit or zero bits (often depicted as strings of zeroes and ones). Computers use these
types of signals and use modems to convert digital signals to analog signals.
Difficulty: Challenging
AACSB: Information technology; Written and oral communication
LO: 7-2: What are the different types of networks?

10
39) What are some of the common types of physical and wireless transmission media and what
differentiates them from one another?
Answer: Common types of physical transmission media include twisted pair wire, coaxial cable,
fiber-optic cable, and wireless transmission media. Twisted pair wire consists of strands of
copper wire twisted in pairs for voice and data communications. Coaxial cable consists of thickly
insulated copper wires capable of high-speed data transmission and resistance to interference.
Fiber-optic cable consists of strands of clear glass fiber that transmit data at very high speeds as
pulses of light generated by lasers. Wireless transmission media is based on radio signals and
involves both terrestrial and satellite microwave systems and cellular networks.
Difficulty: Challenging
AACSB: Information technology; Written and oral communication
LO: 7-2: What are the different types of networks?

40) Which of the following is not one of the top five search engines?
A) Facebook
B) Yahoo
C) Microsoft Bing
D) Baidu
E) Google
Answer: A
Difficulty: Moderate
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

41) Digital subscriber lines:


A) operate over existing telephone lines to carry voice, data, and video.
B) operate over coaxial cable lines to deliver Internet access.
C) are very-high-speed data lines typically leased from long-distance telephone companies.
D) have up to twenty-four 64-Kbps channels.
E) are assigned to every computer on the Internet.
Answer: A
Difficulty: Moderate
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

11
42) T1 and T3 lines:
A) operate over existing telephone lines to carry voice, data, and video.
B) operate over coaxial lines to deliver Internet access.
C) do not provide guaranteed service levels, but simply "best effort."
D) have up to twenty-four 64-Kbps channels.
E) are high-speed, leased data lines providing guaranteed service levels.
Answer: E
Difficulty: Moderate
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

43) What service converts natural language names to IP addresses?


A) HTML
B) FTP
C) IP
D) HTTP
E) DNS
Answer: E
Difficulty: Moderate
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

44) The domain .gov is a(n):


A) Internet root domain.
B) top-level domain.
C) host domain.
D) network domain.
E) third level domain.
Answer: B
Difficulty: Moderate
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

45) In the domain name "http://books.pearson.com", which element is the second-level domain?
A) books
B) pearson.com
C) com
D) none; there is no second-level domain in this name
E) books.pearson
Answer: B
Difficulty: Moderate
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

12
46) Which organization manages the domain name system of the Internet?
A) None (no one "owns" the Internet)
B) W3C
C) ICANN
D) The Department of Commerce (U.S.)
E) IAB
Answer: C
Difficulty: Challenging
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

47) IPv6 has been developed in order to:


A) update the packet transmission protocols for higher bandwidth.
B) create more IP addresses.
C) allow for different levels of service.
D) support Internet2.
E) reduce excess IP addresses.
Answer: B
Difficulty: Moderate
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

48) Predictive search in Google's search engine:


A) maintains a history of your searches and then predicts what you will search on next.
B) uses a tracking service and cookies on your browser to predict search results.
C) uses a knowledge graph of what similar people searched on to predict your search interests.
D) uses a semantic approach to predict what you are looking for.
E) predicts what you are looking for as you enter words into the query box.
Answer: E
Difficulty: Challenging
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

13
49) Instant messaging is a type of ________ service.
A) chat
B) cellular
C) email
D) wireless
E) network
Answer: A
Difficulty: Easy
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

50) ________ integrate disparate channels for voice communications, data communications,
instant messaging, email, and electronic conferencing into a single experience.
A) Wireless networks
B) Intranets
C) Virtual private networks
D) Modems
E) Unified communications
Answer: E
Difficulty: Easy
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

51) A VPN:
A) is an encrypted private network configured within a public network.
B) is more expensive than a dedicated network.
C) provides secure, encrypted communications using Telnet.
D) is an Internet-based service for delivering voice communications.
E) is a proprietary networking service technology developed by individual corporations.
Answer: A
Difficulty: Moderate
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

14
52) Web browser software requests web pages from the Internet using which of the following
protocols?
A) URL
B) HTTP
C) DNS
D) HTML
E) FTP
Answer: B
Difficulty: Moderate
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

53) Together, a protocol prefix, a domain name, a directory path, and a document name, are
called a(n):
A) uniform resource locator.
B) IP address.
C) third-level domain.
D) root domain.
E) child domain.
Answer: A
Difficulty: Moderate
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

54) Which of the following Internet services enables logging on to one computer system and
doing work on another?
A) Email
B) FTP
C) Newsgroups
D) Instant messaging
E) Telnet
Answer: E
Difficulty: Moderate
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

15
55) Which of the following pulls content from websites and feeds it automatically to users'
computers?
A) FTP
B) RSS
C) HTTP
D) Bluetooth
E) IPv6
Answer: B
Difficulty: Moderate
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

56) Which of the following can be used to help a website achieve a higher ranking with the
major search engines?
A) VPN
B) shopping bots
C) SEM
D) SEO
E) RSS
Answer: D
Difficulty: Easy
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

57) Which of the following statements is not true about search engines?
A) They are arguably the "killer app" of the Internet era.
B) They attempt to solve the problem of finding useful information on the web nearly instantly.
C) They have become major advertising platforms and shopping tools.
D) There are hundreds of search engines vying for user attention, with no clear leader having yet
emerged.
E) Users are increasingly using search engines on mobile devices.
Answer: D
Difficulty: Easy
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

16
58) Which process is used to protect transmitted data in a VPN?
A) Tunneling
B) PPP
C) VOIP
D) Packet-switching
E) Chaining
Answer: A
Difficulty: Challenging
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

59) ________ monetizes the value of the data stored by search engines.
A) TCP/IP
B) RSS
C) WiMax
D) IoT
E) SEM
Answer: E
Difficulty: Moderate
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

60) Which of the following is an open source blogging tool and content management system?
A) Twitter
B) RSS
C) WordPress
D) Wikipedia
E) Baidu
Answer: C
Difficulty: Moderate
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

61) Which one of the following statements is not true?


A) The Internet backbone is owned entirely by the federal government in the United States.
B) ICANN manages the domain name system.
C) The IAB establishes the overall structure of the Internet.
D) The Internet must conform to laws of the nation-states in which it operates.
E) W3C determines programming standards for the Internet.
Answer: A
Difficulty: Challenging
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

17
62) A(n) ________ is a commercial organization with a permanent connection to the Internet that
sells temporary connections to retail subscribers.
A) RSS
B) WAN
C) NFP
D) ISP
E) FTP
Answer: D
Difficulty: Moderate
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

63) Companies that own Internet backbone networks are called:


A) regional network providers.
B) enhanced service providers.
C) internet bulk providers.
D) backbone providers.
E) network service providers.
Answer: E
Difficulty: Moderate
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

64) A(n) ________ is software for locating and managing stored web pages.
A) web server
B) net server
C) router
D) modem
E) hub
Answer: A
Difficulty: Moderate
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

18
65) The NHL Puck and Player Tracking system described in the chapter opening case is an
example of which of the following?
A) Visual web application
B) 3D web application
C) IoT application
D) Intelligent agent software
E) App Internet
Answer: C
Difficulty: Moderate
AACSB: Application of knowledge
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

66) More than 80 percent of mobile minutes in the United States are generated through apps.
Answer: TRUE
Difficulty: Easy
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

67) Wikis allow visitors to change or add to the original posted material.
Answer: TRUE
Difficulty: Easy
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

68) SaaS business models are one of the trends leading toward a future web.
Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

69) VoIP technology delivers voice information in digital form using circuit switching.
Answer: FALSE
Difficulty: Easy
AACSB: Information technology
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

70) Mobile search makes up less than 50% of all Internet searches.
Answer: FALSE
Difficulty: Easy
AACSB: Application of knowledge
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

19
71) SEM saves consumers cognitive energy and increases search costs.
Answer: FALSE
Difficulty: Moderate
AACSB: Application of knowledge
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

72) DNS has a hierarchical structure.


Answer: TRUE
Difficulty: Easy
AACSB: Application of knowledge
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

73) In addition to being an online retailer, Amazon is also a powerful product search engine.
Answer: TRUE
Difficulty: Easy
AACSB: Application of knowledge
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

74) The Internet of Things is based on billions of Internet-connected sensors throughout the
physical world.
Answer: TRUE
Difficulty: Easy
AACSB: Application of knowledge
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

75) What is IPv6 and why is it necessary?


Answer: The Internet was not originally designed to handle the transmission of massive
quantities of data and billions of users. Because of sheer Internet population growth, the world is
about to run out of available IP addresses using the old addressing convention. The old
addressing system is being replaced by a new version of the IP addressing schema called IPv6
(Internet Protocol version 6), which contains 128-bit addresses (2 to the power of 128), or more
than a quadrillion possible unique addresses. IPv6 is compatible with most modems and routers
sold today, and IPv6 will fall back to the old addressing system if IPv6 is not available on local
networks. The transition to IPv6 will take several years as systems replace older equipment.
Difficulty: Challenging
AACSB: Application of knowledge; Information technology; Written and oral communication
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

20
76) What is VoIP and what business advantages does it provide?
Answer: Voice over IP (VoIP) technology delivers voice information in digital form using packet
switching, avoiding the tolls charged by local and long-distance telephone networks. Calls that
would ordinarily be transmitted over public telephone networks travel over the corporate
network based on the Internet protocol, or over the public Internet. Voice calls can be made and
received with a computer equipped with a microphone and speakers or with a VoIP-enabled
telephone. Cable firms such as Time Warner and Cablevision provide VoIP service bundled with
their high-speed Internet and cable offerings. Skype offers free VoIP worldwide using a peer-to-
peer network, and Google has its own free VoIP service. Although up-front investments are
required for an IP phone system, VoIP can reduce communication and network management
costs by 20 to 30 percent. For example, VoIP saves Virgin Entertainment Group $700,000 per
year in long-distance bills. In addition to lowering long-distance costs and eliminating monthly
fees for private lines, an IP network provides a single voice-data infrastructure for both
telecommunications and computing services. Companies no longer have to maintain separate
networks or provide support services and personnel for each type of network.
Difficulty: Challenging
AACSB: Application of knowledge; Information technology; Written and oral communication
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

77) What are some of the key features of the future Web and Internet?
Answer: The key features of the future Web and Internet are more tools for individuals to make
sense out of the trillions of pages on the Internet, or the millions of apps available for
smartphones and a visual, even three-dimensional (3D), web where you can walk through pages
in a 3D environment. Even closer in time is a pervasive web that controls everything from a
city's traffic lights and water usage, to the lights in your living room, to your car's rear-view
mirror, not to mention managing your calendar and appointments. This is referred to as the
Internet of Things (IoT) and is based on billions of Internet-connected sensors throughout our
physical world. Objects, animals, or people are provided with unique identifiers and the ability to
transfer data over a network without requiring human-to-human or human-to-computer
interaction. The App Internet is another element in the future web. The growth of apps within the
mobile platform is astounding. More than 80 percent of mobile minutes in the United States are
generated through apps, as opposed to browsers. Apps give users direct access to content and are
much faster than loading a browser and searching for content. Other complementary trends
leading toward a future web include more widespread use of cloud computing and software as a
service (SaaS) business models, ubiquitous connectivity among mobile platforms and Internet
access devices, and the transformation of the web from a network of separate siloed applications
and content into a more seamless and interoperable whole.
Difficulty: Challenging
AACSB: Application of knowledge; Information technology; Written and oral communication
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

21
78) Blogs, wikis, and social networking sites were designed for individuals to communicate with
each other. What uses do businesses have for these tools? Give specific examples.
Answer: Businesses can use blogs, wikis, and social networking sites to reach out and market to
potential new customers, to support and give added value to existing customers and and also use
these tools within their company to communicate between departments and share knowledge.
Social networking, in particular, has radically changed how business people stay in touch with
customers, suppliers, and employees; how providers of goods and services learn about their
customers; and how advertisers reach potential customers.Student answers with respect to
specific examples will vary. One answer might be: For example, a software company could have
a blog that discusses in-depth use of a software product. The U.S. Department of Homeland
Security's National Cyber Security Center (NCSC) deployed a wiki to facilitate information
sharing with other federal agencies on threats, attacks, and responses and as a repository for
technical and standards information. Pixar Wiki is a collaborative community wiki for
publicizing the work of Pixar Animation Studios. The wiki format allows anyone to create or edit
an article about a Pixar film. Many businesses have Facebook pages to market their product to
specific groups on Facebook.
Difficulty: Challenging
AACSB: Analytical thinking; Information technology; Written and oral communication
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

79) What has made the Google search engine so successful?


Answer: The Google search engine became so successful because it was one of the first search
engines to incorporate page ranking. Not only does it index the web pages it finds according to
both keywords and combinations of keywords, it also ranks each page according to the number
of pages that link to it, and the number of pages it links to itself. This helped make search results
more relevant when compared to search engines relying solely on keywords used on web pages.
A user could be relatively certain that they would find relevant information within the top results
of a Google search. Improved search results for the user, along with continual improvements to
its search engine, including its Hummingbird search algorithm that enables semantic search, its
Knowledge Graph, which is an effort of the search algorithm to anticipate what you might want
to know more about as you search on a topic; its use of predictive search, which attempts to
guess what you are looking for and suggests search terms as you type your search words, and
other refinements to its search algorithms using mathematical models and artificial intelligence
machine learning to make its responses to queries even more accurate and intelligent has made
Google very successful.
Difficulty: Challenging
AACSB: Analytical thinking; Information technology; Written and oral communication
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

22
80) Explain the Domain Name System. What are some of the common domain name extensions
currently available and what types of services do they designate?
Answer: The Domain Name System (DNS) converts domain names to IP addresses. Domain
names are the English-like names that correspond to the unique 32-bit numeric IP address for
each computer connected to the Internet. DNS is a hierarchy, with the root domain at the top,
top-level domains such as .com and .edu one level below, and second-level domains designate a
top-level name and a second-level name, like amazon.com. Common domain name extensions
include .edu (educational institutions), .gov (government agencies), .mil (military), .net (network
computers), .org (nonprofit organizations and foundations), .biz (business firms), and .info
(information providers). Additionally, countries have their own domain names. Answers may cite
a variety of other domain name extensions.
Difficulty: Challenging
AACSB: Application of knowledge; Written and oral communication
LO: 7-3: How do the Internet and Internet technology work, and how do they support
communication and e-business?

81) All of the following are physical components of an RFID system except:
A) bar codes.
B) antennas.
C) radio transmitters.
D) tags.
E) readers.
Answer: A
Difficulty: Moderate
AACSB: Information technology
LO: 7-4: What are the principal technologies and standards for wireless networking,
communication, and Internet access?

82) Which digital cellular standard is used widely throughout the world except the United States?
A) GSM
B) CDMA
C) WLAN
D) LTD
E) 4G
Answer: A
Difficulty: Challenging
AACSB: Information technology
LO: 7-4: What are the principal technologies and standards for wireless networking,
communication, and Internet access?

23
83) Which of the following is the popular name for the 802.15 wireless networking standard?
A) Bluetooth
B) WiMax
C) WLAN.
D) Wi-Fi
E) RFID
Answer: A
Difficulty: Moderate
AACSB: Information technology
LO: 7-4: What are the principal technologies and standards for wireless networking,
communication, and Internet access?

84) Which of the following statements about RFID is not true?


A) RFIDs transmit only over a short range.
B) RFIDs use an antenna to transmit data.
C) Microchips embedded in RFIDs are used to store data.
D) RFIDs require line-of-sight contact to be read.
E) RFID tags and antennas come in a variety of shapes and sizes.
Answer: D
Difficulty: Moderate
AACSB: Information technology
LO: 7-4: What are the principal technologies and standards for wireless networking,
communication, and Internet access?

85) Wireless sensor networks (WSNs) are used for the following tasks except:
A) processing consumer transactions.
B) monitoring traffic.
C) detecting radioactive materials.
D) protecting property.
E) identifying vehicles for trucking firms.
Answer: A
Difficulty: Moderate
AACSB: Information technology
LO: 7-4: What are the principal technologies and standards for wireless networking,
communication, and Internet access?

86) 4G networks use which of the following standards?


A) GSM and LTD
B) CDMA and PAN
C) LTE and LTD
D) T-Mobile and AT&T
E) LTE and WiMax
Answer: E
Difficulty: Moderate
AACSB: Information technology
LO: 7-4: What are the principal technologies and standards for wireless networking,
communication, and Internet access?

24
87) Which of the following statements about 5G is true?
A) 5G is based on the GSM standard.
B) 5G's top data transmission rate is in the megabyte range.
C) 5G will be able to transmit data in the gigabit range.
D) 5G will have longer transmission delays.
E) 5G networks have not yet been launched by Internet network providers.
Answer: C
Difficulty: Moderate
AACSB: Information technology
LO: 7-4: What are the principal technologies and standards for wireless networking,
communication, and Internet access?

88) Bluetooth can be used to link up to ________ devices within a 10-meter area using low-
power, radio-based communication.
A) two
B) five
C) eight
D) fifteen
E) twenty
Answer: C
Difficulty: Challenging
AACSB: Information technology
LO: 7-4: What are the principal technologies and standards for wireless networking,
communication, and Internet access?

89) Which of the following technologies is used to reduce Wi-Fi network interference from
nearby systems in the same spectrum?
A) RFID
B) Hotspots
C) Bluetooth
D) WiMax
E) MIMO
Answer: E
Difficulty: Moderate
AACSB: Information technology
LO: 7-4: What are the principal technologies and standards for wireless networking,
communication, and Internet access?

25
90) The 802.11 set of standards is known as:
A) RFID.
B) WSN.
C) Wi-Fi.
D) WiMax.
E) WAN.
Answer: C
Difficulty: Moderate
AACSB: Information technology
LO: 7-4: What are the principal technologies and standards for wireless networking,
communication, and Internet access?

91) The WiMax standard can transmit up to a distance of approximately:


A) 30 meters.
B) 500 meters.
C) 30 miles.
D) 5 miles.
E) 70 miles.
Answer: C
Difficulty: Challenging
AACSB: Information technology
LO: 7-4: What are the principal technologies and standards for wireless networking,
communication, and Internet access?

92) Based on your reading of the examples in the chapter, which of the following would be the
best use of RFID for a business?
A) Logging transactions
B) Managing the supply chain
C) Lowering network costs
D) Enabling client communication
E) Improving employee engagement
Answer: B
Difficulty: Moderate
AACSB: Analytical thinking
LO: 7-4: What are the principal technologies and standards for wireless networking,
communication, and Internet access?

26
93) Which of the following technologies does Walmart use to track items for sale on store
shelves?
A) Web 3.0
B) CDMA
C) BLE
D) GPS
E) RFID
Answer: E
Difficulty: Challenging
AACSB: Information technology
LO: 7-4: What are the principal technologies and standards for wireless networking,
communication, and Internet access?

94) A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a
wired network, router, or hub.
A) RFID receiver
B) WiMax receiver
C) access point
D) hub
E) PAN receiver
Answer: C
Difficulty: Challenging
AACSB: Information technology
LO: 7-4: What are the principal technologies and standards for wireless networking,
communication, and Internet access?

95) Mobile is the leading digital platform, with total activity on smartphones and tablets
accounting for two-thirds of digital media time spent.
Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
LO: 7-4: What are the principal technologies and standards for wireless networking,
communication, and Internet access?

96) Apple Pay uses an RFID-related technology called near field communication.
Answer: TRUE
Difficulty: Easy
AACSB: Application of knowledge
LO: 7-4: What are the principal technologies and standards for wireless networking,
communication, and Internet access?

97) NFC tags are always passive.


Answer: FALSE
Difficulty: Easy
AACSB: Application of knowledge
LO: 7-4: What are the principal technologies and standards for wireless networking,
communication, and Internet access?

27
98) How are RFID systems used in inventory control and supply chain management?
Answer: In inventory control and supply chain management, RFID systems capture and manage
more detailed information about items in warehouses or in production than bar coding systems.
If a large number of items are shipped together, RFID systems track each pallet, lot, or even unit
item in the shipment. This technology may help companies improve receiving and storage
operations by enhancing their ability to "see" exactly what stock is stored in warehouses or on
retail store shelves.
Difficulty: Challenging
AACSB: Information technology; Written and oral communication
LO: 7-4: What are the principal technologies and standards for wireless networking,
communication, and Internet access?

99) What are wireless sensor networks? How do they work and what are they used for?
Answer: Wireless sensor networks (WSNs) are networks of interconnected wireless devices that
are embedded into the physical environment to provide measurements of many points over large
spaces. These devices have built-in processing, storage, and radio frequency sensors and
antennas. They are linked into an interconnected network that routes the data they capture to a
computer for analysis. These networks range from hundreds to thousands of nodes. Because
wireless sensor devices are placed in the field for years at a time without any maintenance or
human intervention, they must have very low power requirements and batteries capable of lasting
for years. Wireless sensor networks are valuable in areas such as monitoring environmental
changes; monitoring traffic or military activity; protecting property; efficiently operating and
managing machinery and vehicles; establishing security perimeters; monitoring supply chain
management; or detecting chemical, biological, or radiological material.
Difficulty: Challenging
AACSB: Information technology; Written and oral communication
LO: 7-4: What are the principal technologies and standards for wireless networking,
communication, and Internet access?

28
100) What are some of the standards and networks used in digital cellular service, and where are
they in use?
Answer: Common cellular system standards include the Global System for Mobile
Communications (GSM), which is used in Europe and much of the world outside of the United
States and is known for its international roaming capability. In the U.S., Code Division Multiple
Access is used by Verizon and Sprint. It is a more efficient system than GSM. The generations of
networks in use today by cellular systems includes 3G, 4G, and 5G. 4G networks offer higher
speeds than 3G. The standards in use by 4G Networks are Long Term Evolution (LTE) and
Worldwide Interoperability for Microwave Access (WiMax). The next generation of wireless
technology, called 5G, is designed to support transmission of huge amounts of data in the gigabit
range, with fewer transmission delays and the ability to connect many more devices (such as
sensors and smart devices) at once than existing cellular systems. 5G technology will be needed
for self-driving vehicles, smart cities, and extensive use of the Internet of Things. AT&T,
Verizon, and other carriers are starting to launch 5G networks, which will also improve the speed
and intensive data-handling of smartphones. Mobile Internet users will be able to download
entire movies within seconds.
Difficulty: Challenging
AACSB: Information technology; Written and oral communication
LO: 7-4: What are the principal technologies and standards for wireless networking,
communication, and Internet access?

29

You might also like