🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Chapter 07 --.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Document Details

ComplimentaryLobster

Uploaded by ComplimentaryLobster

University of Bahrain

Tags

networking computer networks data transmission information technology

Full Transcript

Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 1) Which of the following are the three primary network categories? A) LAN, WAN, SAN B) LAN, WAN, MAN C) LAN, SAN, XAN D) LAN, WAN, XAN 2) What is a larg...

Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 1) Which of the following are the three primary network categories? A) LAN, WAN, SAN B) LAN, WAN, MAN C) LAN, SAN, XAN D) LAN, WAN, XAN 2) What is a large computer network usually spanning a city or a specific infrastructure like a college? A) metropolitan area network (MAN) B) local area network (LAN) C) wide area network (WAN) D) secure area network (SAN) 3) What spans a large geographic area such as a state, province, or country, similar to the Internet? A) metropolitan area network (MAN) B) local area network (LAN) C) wide area network (WAN) D) All of the answers are correct. 4) What connects a group of computers in close proximity, such as in a school or office setting? Version 1 1 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) metropolitan area network (MAN) B) local area network (LAN) C) wide area network (WAN) D) All of the answers are correct. 5) Which of the below offers a common example of a local area network? A) college campus B) home office C) city library D) All of the answers are correct. 6) Which of the below offers an example of a wide area network? A) the Internet B) Microsoft’s main campus in Washington C) the city of Denver’s court and police departments D) All of the answers are correct. 7) Which of the below is an example of a wide area network? Version 1 2 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) home office B) business office C) college dorm room D) the Internet 8) What is the maximum amount of data that can pass from one point to another in a unit of time? A) bandwidth B) frequency C) wide area network D) All of the answers are correct. 9) Which of the following terms refers to the smallest element of data and has a value of either 0 or 1? A) bit B) bandwidth C) local area network D) metropolitan area network 10) What measures bandwidth in terms of numbers transferred or received per unit of time? Version 1 3 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) All of the answers are correct. B) Wi-Fi C) wide area network D) bit rate 11) What is the maximum amount of data that can pass from one point to another in a unit of time? A) bandwidth B) bit rate C) bit D) wireless fidelity 12) What is the smallest element of data and has a value of either 0 or 1? A) bandwidth B) bit rate C) bit D) wireless fidelity 13) What is the number of bits transferred or received per unit of time? Version 1 4 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) bandwidth B) bit rate C) bit D) wireless fidelity 14) What includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a Wi-Fi signal? A) Wi-Fi infrastructure B) bit rate C) bit D) wireless fidelity 15) What is a technology that connects individual devices to other parts of a network through radio connections? A) radio area network B) wide area network C) metropolitan area network D) All of the answers are correct. 16) What is the fifth-generation wireless broadband technology based on the 802.11ac standard engineered to greatly increase the speed and responsiveness of wireless networks? Version 1 5 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) 5G B) WiMAX C) Wi-Fi 6 D) All of the answers are correct. 17) What is the next generation of Wi-Fi expected to operate at 9.6 Gbps? A) 2G B) Wi-Fi 6 C) radio area network D) bandwidth 18) What is the ability to purchase goods and services through a wireless Internet-enabled device? A) bandwidth B) mobile business C) All of the answers are correct. D) Wi-Fi 6 19) Which two terms are synonymous but have different meanings? Version 1 6 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) mobile and wireless B) bit and Wi-Fi 6 C) LAN and WAN D) All of the answers are correct. 20) What means the technology can travel with the user; for instance, users can download software, email messages, and web pages onto a laptop or other mobile device? A) mobile B) wireless C) ebusiness D) radio access network 21) What refers to any type of operation accomplished without the use of a hard-wired connection? A) digital divide B) wireless C) actor D) bad actor 22) Which of the following is a type of bandwidth speed? Version 1 7 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) megabit B) wireless C) local area network D) radio access network 23) What is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves? A) Bluetooth B) wireless fidelity (Wi-Fi) C) wide area network (WAN) D) wireless data centers 24) What is a wireless network that provides communication over a short distance that is intended for use with devices that are owned and operated by a single user? A) professional area network B) All of the answers are correct. C) personal area network D) political area network 25) What is a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices? Version 1 8 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) laptop B) digital divide C) Bluetooth D) camera 26) Which network uses radio signals to transmit and receive data over distances of a few hundred feet? A) wireless MAN B) wireless WAN C) All of the answers are correct. D) wireless LAN 27) What are areas around access points where users can connect to the Internet via Wi-Fi? A) hotspots B) wireless WAN C) smart phone D) WiMax 28) A wireless MAN (WMAN) is a metropolitan area network that uses ___________ to transmit and receive data? Version 1 9 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) hotspots B) kilobytes C) digital divide D) radio signals 29) Which of the following is the correct definition for the acronym WiMAX? A) Worldwide Interoperability for Microwave Access B) World Interconnected through Mobile Awareness C) All of the answers are correct. D) Wide International for Misinformation Access 30) What is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred? A) streaming B) smart phone C) networking D) wireless 31) What is data that is generated continuously by thousands of data sources, which typically send in the data records simultaneously, and in small sizes (order of kilobytes)? Version 1 10 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) streaming data B) smart phone C) networking D) wireless 32) What is a space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area? A) Wi-Fi B) satellite C) digital divide D) streaming data 33) What is Bluetooth? A) means the technology can travel with the user; for instance, users can download software, email messages, and web pages onto a laptop or other mobile device B) refers to any type of operation accomplished without the use of a hard-wired connection C) a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices D) All of the answers are correct. 34) What is a personal area network (PAN)? Version 1 11 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) All of the answers are correct. B) refers to any type of operation accomplished without the use of a hard-wired connection C) a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices D) provides communication for devices owned by a single user that work over a short distance 35) What is an access point (AP)? A) the computer or network device that serves as an interface between devices and the network B) refers to any type of operation accomplished without the use of a hard-wired connection C) a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices D) All of the answers are correct. 36) What is a wireless MAN? A) a metropolitan area network that uses radio signals to transmit and receive data B) a communications technology aimed at providing high-speed wireless data over metropolitan area networks C) a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves D) All of the answers are correct. Version 1 12 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 37) What is worldwide interoperability for microware access (WiMAX)? A) a metropolitan area network that uses radio signals to transmit and receive data B) a communications technology aimed at providing high-speed wireless data over metropolitan area networks C) a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves D) All of the answers are correct. 38) What is wireless fidelity (Wi-Fi)? A) a metropolitan area network that uses radio signals to transmit and receive data B) a communications technology aimed at providing high-speed wireless data over metropolitan area networks C) a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves D) All of the answers are correct. 39) What is war chalking? A) All of the answers are correct. B) the practice of tagging pavement with codes displaying where Wi-Fi access is available C) deliberately searching for Wi-Fi signals while driving by in a vehicle D) remotely controls smart phones and tablets, ensuring data security Version 1 13 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 40) What is war driving? A) All of the answers are correct. B) the practice of tagging pavement with codes displaying where Wi-Fi access is available C) deliberately searching for Wi-Fi signals while driving by in a vehicle D) remotely controls smart phones and tablets, ensuring data security 41) What is data that is generated continuously by thousands of data sources, which typically send in the data records simultaneously, and in small sizes? A) streaming data B) Wi-Fi 6 C) voice over IP D) protected WiMax 42) What is wired equivalent privacy (WEP)? A) a metropolitan area network that uses radio signals to transmit and receive data B) a communications technology aimed at providing high-speed wireless data over metropolitan area networks C) a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves D) an encryption algorithm designed to protect wireless transmission data Version 1 14 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 43) What is a standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remain private? A) secure sockets layer B) SSL certificate C) secure hypertext transfer protocol D) wired equivalent privacy 44) What is an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company? A) secure sockets layer B) SSL Certificate C) secure hypertext transfer protocol D) wired equivalent privacy 45) What is a combination of HTTP and SSL to provide encryption and secure identification of an Internet server? A) secure sockets layer B) SSL Certificate C) secure hypertext transfer protocol D) wired equivalent privacy 46) What is an encryption algorithm designed to protect wireless transmission data? Version 1 15 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) secure sockets layer B) SSL certificate C) secure hypertext transfer protocol D) wired equivalent privacy 47) What is deliberately searching for Wi-Fi signals while driving by in a vehicle? A) war chalking B) war driving C) actor D) bad actor 48) What is the practice of tagging pavement with codes displaying where Wi-Fi access is available? A) war chalking B) war driving C) actor D) bad actor 49) What is an entity that is capable of participating in an action or a network? Version 1 16 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) war chalking B) war driving C) actor D) bad actor 50) What is an entity that is participating with ill-intentions? A) war chalking B) war driving C) actor D) bad actor 51) What is an actor? A) the blending of personal and business use of technology devices and applications B) the science and art of making an illustrated map or chart C) an entity that is capable of participating in an action or a network D) an entity that is participating with ill-intentions 52) What is a bad actor? Version 1 17 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) the blending of personal and business use of technology devices and applications B) the science and art of making an illustrated map or chart C) an entity that is capable of participating in an action or a network D) an entity that is participating with ill-intentions 53) What is IT consumerization? A) the blending of personal and business use of technology devices and applications B) the science and art of making an illustrated map or chart C) an entity that is capable of participating in an action or a network D) an entity that is participating with ill-intentions 54) What is the blending of personal and business use of technology devices and applications? A) IT consumerization B) pervasive computing C) enterprise mobility management D) containerization 55) What is the growing trend of embedding computer capabilities into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user’s needs to interact with computers as computers? Version 1 18 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) IT consumerization B) pervasive computing C) enterprise mobility management D) containerization 56) What is an enterprisewide security strategy to enforce corporate epolicies while enabling employee use of mobile devices such as smart phones and tablets? A) IT consumerization B) pervasive computing C) enterprise mobility management D) containerization 57) What isolates corporate applications from personal applications on a device? A) IT consumerization B) pervasive computing C) enterprise mobility management D) containerization 58) What are the three primary areas of an enterprise mobility management strategy? Version 1 19 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) mobile device management B) mobile application management C) mobile information management D) mobile pervasive management 59) What is an enterprisewide security strategy to enforce corporate epolicies while enabling employee use of mobile devices such as smart phones and tablets? A) mobile device management B) mobile application management C) mobile information management D) enterprise mobility management 60) What is a security strategy comprised of products and services that offer remote support for mobile devices, such as smart phones, laptops, and tablets? A) mobile device management B) mobile application management C) mobile information management D) enterprise mobility management 61) What is a security strategy that administers and enforces corporate epolicies for applications on mobile devices? Version 1 20 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) mobile device management B) mobile application management C) mobile information management D) enterprise mobility management 62) What is a security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it? A) mobile device management B) mobile application management C) mobile information management D) enterprise mobility management 63) Which policy allows employees to use their own device? A) bring your own device B) choose your own device C) company-issued, personally-enabled D) ePolicy 64) Which policy allows employees to choose a company approved and configured device? Version 1 21 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) bring your own device B) choose your own device C) company-issued, personally-enabled D) ePolicy 65) Which policy provides employees with corporate devices? A) bring your own device B) choose your own device C) company-issued, personally-enabled D) ePolicy 66) What isolates corporate applications from personal applications on a device? A) containerization or application sandboxing B) dual personal technology C) accelerometer D) fast data 67) What is another name for containerization, which isolates corporate applications from personal applications on a device? Version 1 22 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) application sandboxing B) dual persona technology C) accelerometer D) fast data 68) What creates two completely separate user interfaces one the same device, one for work and one for personal use? A) containerization B) dual personal technology C) accelerometer D) fast data 69) What is a device that can measure the force of acceleration, whether caused by gravity or by movement? A) containerization B) dual personal technology C) accelerometer D) fast data 70) What is a website that looks and behaves as if it is a mobile application, but it is just a normal website? Version 1 23 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) containerization B) dual personal technology C) accelerometer D) progressive web application 71) Which of the following is a characteristic of mobile application management? A) containerization B) accelerometer C) dual personal technology D) All of the answers are correct. 72) What is the application of big data analytics to smaller data sets in near-real or real-time in order to solve a problem or create business value? A) fast data B) data in motion C) data at rest D) data in use 73) What refers to all data in computer storage? Version 1 24 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) fast data B) data in motion C) data at rest D) data in use 74) What is a stream of data that is moving or being transported between locations within or between computer systems? A) fast data B) data in motion C) data at rest D) data in use 75) What is another term for data in motion? A) fast data, slow data B) transit data, flight data C) All of the answers are correct. D) big data, data analytics 76) What is data that is currently being updated, processed, erased, accessed, or read by a system? Version 1 25 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) fast data B) data in motion C) data at rest D) data in use 77) Which of the below is experiencing rapid growth due to wireless technology? A) radio-frequency identification B) global positioning systems C) geographic information systems D) All of the answers are correct. 78) Which business application uses electronic tags and labels to identify objects wirelessly over short distances? A) radio-frequency identification B) global positioning systems C) geographic information systems D) location-based services 79) Which business application uses location information to provide a service and is designed to give mobile users instant access to personalized local content? Version 1 26 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) radio-frequency identification B) global positioning systems C) geographic information systems D) location-based services 80) Which business application is a satellite-based navigation system providing extremely accurate position, time, and speed information? A) radio-frequency identification B) global positioning systems C) geographic information systems D) location-based services 81) Which business application consists of hardware, software, and data that provide location information for display on a multidimensional map? A) radio-frequency identification B) global positioning systems C) geographic information systems D) location-based services 82) Which of the following is not a primary use of GIS? Version 1 27 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) finding what is nearby from a specific location B) mapping densities C) routing information D) ensuring safety equipment is on an airplane before a flight 83) What uses GPS tracking to track vehicles? A) automatic vehicle location B) geographic information system C) cartography D) All of the answers are correct. 84) What stores, views, and analyzes geographic data creating multidimensional charts or maps. For example, GIS are monitoring global warming by measuring the speed of glaciers melting in Canada, Greenland, and Antarctica? A) automatic vehicle location B) geographic information system C) cartography D) All of the answers are correct. 85) What is the science and art of making an illustrated map or chart. GIS allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps? Version 1 28 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) automatic vehicle location B) geographic information system C) cartography D) dual persona technology 86) What identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more? A) automatic vehicle location B) geographic information system C) cartography D) spatial data 87) What is a coding process that takes a digital map feature and assigns it an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category)? A) geocoding B) geocache C) geocoin D) All of the answers are correct. 88) Who are certified in geocoding practices to ensure industry standards are met when classifying spatial data? Version 1 29 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) GIS professionals B) enterprise architects C) database engineers D) All of the answers are correct. 89) What is a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find? A) geocoding B) geocache C) geocoin D) All of the answers are correct. 90) What is a round coin-sized object, is uniquely numbered and hidden in geocache? A) geocoding B) geocache C) geocoin D) All of the answers are correct. 91) What is the time of day of an expected arrival at a certain destination and is typically used for navigation applications? Version 1 30 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) estimated time of arrival B) estimated time enroute C) wireless MAN D) wireless LAN 92) What is the time remaining before reaching a destination using the present speed and is typically used for navigation applications? A) estimated time of arrival B) estimated time enroute C) wireless MAN D) wireless WAN 93) What is an RFID tag? A) an electronic identification device that is made up of a chip and antenna B) a transmitter/receiver that reads the contents of RFID tags in the area C) does not have a power source D) have their own transmitter and a power source (typically a battery) 94) What is an RFID reader (RFID interrogator)? Version 1 31 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) an electronic identification device that is made up of a chip and antenna B) a transmitter/receiver that reads the contents of RFID tags in the area C) does not have a power source D) have their own transmitter and a power source (typically a battery) 95) What is asset tracking? A) occurs when a company places active or semipassive RFID tags on expensive products or assets to gather data on the items’ location with little or no manual intervention B) All of the answers are correct. C) a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxicab speeds D) a satellite-based navigation system providing extremely accurate position, time, and speed 96) What is a global positioning system (GPS)? A) occurs when a company places active or semipassive RFID tags on expensive products or assets to gather data on the items’ location with little or no manual intervention B) All of the answers are correct. C) a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxicab speeds D) a satellite-based navigation system providing extremely accurate position, time, and speed information Version 1 32 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 97) What is automatic vehicle location (AVL)? A) uses GPS tracking to track vehicles B) All of the answers are correct. C) a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxicab speeds D) a satellite-based navigation system providing extremely accurate position, time, and speed information 98) What is geocache? A) All of the answers are correct. B) a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find C) a north/south measurement of position D) an east/west measurement of position 99) What is a geocoin? A) a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxicab speeds B) an east/west measurement of position C) a north/south measurement of position D) a round coin-sized object, is uniquely numbered and hidden in geocache 100) What is estimated time of arrival (ETA)? Version 1 33 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxicab speeds B) a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find C) a north/south measurement of position D) the time of day of an expected arrival at a certain destination and is typically used for navigation applications 101) What is estimated time enroute? A) the time remaining before reaching a destination using the present speed and is typically used for navigation applications B) the time of day of an expected arrival at a certain destination and is typically used for navigation applications C) a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxicab speeds D) a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find 102) What is a geographic information system (GIS)? A) a north/south measurement of position B) an east/west measurement of position C) stores, views, and analyzes geographic data, creating multidimensional charts or maps D) a round coin-sized object, is uniquely numbered and hidden in geocache Version 1 34 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 103) What is cartography? A) an east/west measurement of position B) the science and art of making an illustrated map or chart C) stores, views, and analyzes geographic data, creating multidimensional charts or maps D) a round coin-sized object, is uniquely numbered and hidden in geocache 104) What is a GIS map? A) links business assets to a centralized system where they can be tracked and monitored over time B) identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more C) stores, views, and analyzes geographic data, creating multidimensional charts or maps D) a round coin-sized object, is uniquely numbered and hidden in geocache 105) What is spatial data? A) identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more B) links business assets to a centralized system where they can be tracked and monitored over time C) stores, views, and analyzes geographic data, creating multidimensional charts or maps D) a round coin-sized object, is uniquely numbered and hidden in geocache 106) What is geocoding? Version 1 35 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ A) identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more B) links business assets to a centralized system where they can be tracked and monitored over time C) in spatial databases is a coding process that assigns a digital map feature to an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category) D) a round coin-sized object, is uniquely numbered and hidden in geocache 107) What do both GPS and GIS use? A) identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more B) links business assets to a centralized system where they can be tracked and monitored over time C) in spatial databases is a coding process that assigns a digital map feature to an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category) D) both use location-based services (LBS) applications that use location information to provide a service 108) A local area network (LAN) connects a group of computers in close proximity, such as in an office building, school, or home. LANs allow sharing of files, printers, games, and other resources. ⊚ true ⊚ false Version 1 36 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 109) A wide area network (WAN) spans a large geographic area such as a state, province, or country. ⊚ true ⊚ false 110) A wide area network (WAN) connects a group of computers in close proximity, such as in an office building, school, or home. ⊚ true ⊚ false 111) A metropolitan area network (MAN) is a large computer network usually spanning a city. Most colleges, universities, and large companies that span a campus use an infrastructure supported by a MAN. ⊚ true ⊚ false 112) A local area network (LAN) is a large computer network usually spanning a city. Version 1 37 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ ⊚ true ⊚ false 113) A wide area network (WAN) spans a large geographic area such as a state, province, or country. Perhaps the best example is the Internet. ⊚ true ⊚ false 114) Wi-Fi infrastructure includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a Wi-Fi signal. ⊚ true ⊚ false 115) A radio access network (RAN) is a technology that connects individual devices to other parts of a network through radio connections. ⊚ true ⊚ false Version 1 38 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 116) 5G is the fifth-generation wireless broadband technology based on the 802.11ac standard engineered to greatly increase the speed and responsiveness of wireless networks. ⊚ true ⊚ false 117) Mobile business (or mbusiness, mcommerce) is the ability to purchase goods and services through a wireless Internet-enabled device. ⊚ true ⊚ false 118) Mobile business is also called low latency business or 5G. ⊚ true ⊚ false 119) A bit (short for binary digit) is the smallest element of data and has a value of either 0 or 1. ⊚ true ⊚ false Version 1 39 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 120) Bandwidth is measured in terms of bit rate (or data rate), the number of bits transferred or received per unit of time. ⊚ true ⊚ false 121) Bandwidth is the maximum amount of data that can pass from one point to another in a unit of time. ⊚ true ⊚ false 122) Worldwide Interoperability for Microwave Access (WiMAX) is a communications technology aimed at providing high-speed wireless data over metropolitan area networks. ⊚ true ⊚ false 123) A personal area network (PAN) provides communication for devices owned by a single user that work over a short distance. ⊚ true ⊚ false Version 1 40 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 124) Bluetooth is a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices. ⊚ true ⊚ false 125) A wireless LAN (WLAN) is a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet. ⊚ true ⊚ false 126) An access point (AP) is the computer or network device that serves as an interface between devices and the network. Each computer initially connects to the access point and then to other computers on the network. ⊚ true ⊚ false 127) A wireless access point (WAP) enables devices to connect to a wireless network to communicate with each other. Version 1 41 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ ⊚ true ⊚ false 128) Hotspots are designated locations where Wi-Fi access points are publicly available. ⊚ true ⊚ false 129) A wireless MAN (WMAN) is a metropolitan area network that uses radio signals to transmit and receive data. ⊚ true ⊚ false 130) A wireless WAN (WWAN) is a wide area network that uses radio signals to transmit and receive data. ⊚ true ⊚ false Version 1 42 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 131) Streaming is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred. ⊚ true ⊚ false 132) A satellite is a space station that orbits the Earth, receiving and transmitting signals from Earth-based stations over a wide area. ⊚ true ⊚ false 133) Wi-Fi protected access (WPA) a wireless security protocol to protect Wi-Fi networks. ⊚ true ⊚ false 134) A Wi-Fi network is a space station that orbits the Sun, receiving and transmitting signals from Mars-based stations over a wide area. ⊚ true ⊚ false Version 1 43 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 135) Wi-Fi protected access (WAP) is an encryption algorithm designed to protect wireless transmission data. ⊚ true ⊚ false 136) Wired equivalent privacy (WEP) is a wireless security protocol to protect Wi-Fi networks. ⊚ true ⊚ false 137) Wired equivalent privacy (WEP) is an encryption algorithm designed to protect wireless transmission data. ⊚ true ⊚ false 138) War Wi-Fi is the practice of tagging pavement with codes displaying where Wi-Fi access is available. ⊚ true ⊚ false Version 1 44 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 139) War chalking is deliberately searching for Wi-Fi signals while driving by in a vehicle. ⊚ true ⊚ false 140) War chalking is the practice of tagging pavement with codes displaying where Wi-Fi access is available. The codes for war chalking tell other users the kind of access available, the speed of the network, and if the network is secured. ⊚ true ⊚ false 141) War driving is deliberately searching for Wi-Fi signals while driving by in a vehicle. ⊚ true ⊚ false 142) Pervasive computing is the growing trend of embedding computer capabilities into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user’s needs to interact with computers as computers. Version 1 45 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ ⊚ true ⊚ false 143) Enterprise mobility management (EMM) is an enterprisewide security strategy to enforce corporate epolicies while enabling employee use of mobile devices such as smart phones and tablets. ⊚ true ⊚ false 144) Enterprise mobility management (EMM) is an enterprisewide security strategy to enforce war chalking and war driving. ⊚ true ⊚ false 145) Mobile application management (MAM) is a security strategy that administers and enforces corporate epolicies for applications on mobile devices. ⊚ true ⊚ false Version 1 46 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 146) Dual persona technology creates two completely separate user interfaces one the same device, one for work and one for personal use. ⊚ true ⊚ false 147) Mobile application development is the set of processes and procedures involved in writing software for use on wireless devices. ⊚ true ⊚ false 148) Mobile information management is the set of processes and procedures involved in writing software for use on wireless devices. ⊚ true ⊚ false 149) Progressive web application (PWA) is a website that looks and behaves as if it is a mobile application, but it is just a normal website. ⊚ true ⊚ false Version 1 47 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 150) Mobile information management (MIM) is a security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it. ⊚ true ⊚ false 151) An accelerometer is a security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it. ⊚ true ⊚ false 152) Data at rest refers to all data in computer storage. ⊚ true ⊚ false 153) Data in motion refers to all data in computer storage. ⊚ true ⊚ false Version 1 48 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 154) Data in motion (also known as transit or flight) is a stream of data that is moving or being transported between locations within or between computer systems. ⊚ true ⊚ false 155) Data in use is data that is currently being updated, processed, erased, accessed, or read by a system. ⊚ true ⊚ false 156) Radio-frequency identification (RFID) uses electronic tags and labels to identify objects wirelessly over short distances. ⊚ true ⊚ false 157) A global positioning system (GPS) consists of only hardware that provides location information for display on a multidimensional map. Version 1 49 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ ⊚ true ⊚ false 158) A geographic information system (GIS) stores, views, and analyzes geographic data, creating multidimensional charts or maps. ⊚ true ⊚ false 159) A global positioning system (GPS) is a satellite-based navigation system providing extremely accurate position, time, and speed information. ⊚ true ⊚ false 160) A great GIS example, Google Earth, combines satellite imagery, geographic data, and Google’s search capabilities to create a virtual globe that users can download to a computer or mobile device. ⊚ true ⊚ false Version 1 50 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 161) GPS utilizes location-based services (LBS), applications that use location information to provide a service, whereas a GIS does not use LBS applications. ⊚ true ⊚ false 162) Asset tracking occurs when a company places active or semipassive RFID tags on expensive products or assets to gather data on the items’ location with little or no manual intervention. ⊚ true ⊚ false 163) RFID tag is an electronic identification device that is made up of a chip and antenna. ⊚ true ⊚ false 164) RFID reader (RFID interrogator) is a transmitter/receiver that reads the contents of RFID tags in the area. An RFID system is comprised of one or more RFID tags, one or more RFID readers, two or more antennas. ⊚ true ⊚ false Version 1 51 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 165) Automatic vehicle location (AVL) uses GPS tracking to track vehicles. ⊚ true ⊚ false 166) Geographic information system (GIS) stores, views, and analyzes geographic data creating multidimensional charts or maps. For example, GIS is monitoring global warming by measuring the speed of glaciers melting in Canada, Greenland, and Antarctica. ⊚ true ⊚ false 167) Cartography is the science and art of making an illustrated map or chart. GIS allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps. ⊚ true ⊚ false 168) GIS map automation links business assets to a centralized system where they can be tracked and monitored over time. Version 1 52 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ ⊚ true ⊚ false 169) Spatial data (geospatial data or geographic information) identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more. Spatial data can be mapped and is stored as coordinates and topology. A GIS accesses, manipulates, and analyzes spatial data. ⊚ true ⊚ false 170) Wi-Fi is a coding process that takes a digital map feature and assigns it an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category). Wi-Fi professionals are certified in geocoding practices to ensure industry standards are met when classifying spatial data. ⊚ true ⊚ false 171) A geocoin, a round coin-sized object, is uniquely numbered and hidden in geocache. ⊚ true ⊚ false Version 1 53 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 172) Estimated time of arrival (ETA) is the time of day of an expected arrival at a certain destination and is typically used for navigation applications. ⊚ true ⊚ false 173) Estimated time enroute (ETE) is the time remaining before reaching a destination using the present speed and is typically used for navigation applications. ⊚ true ⊚ false 174) LBS differ from RFID in that an LBS cannot track and monitor objects such as inventory. ⊚ true ⊚ false 175) With the power of a wireless network, business professionals can take advantage of mobility allowing them to work from anywhere, at any time, using many different devices. ⊚ true ⊚ false Version 1 54 ‫‪Sara Notes 36825484‬‬ ‫يحرم على اي شخص بيع او تداول الملفات‬ ‫‪Version 1‬‬ ‫‪55‬‬ Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ Answer Key Test name: Chap 07_8e_Baltzan 1) B 2) A 3) C 4) B 5) D 6) D 7) D 8) A 9) A 10) D 11) A 12) C Version 1 56 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 13) B 14) A 15) A 16) A 17) B 18) B 19) A 20) A 21) B 22) A 23) B 24) C 25) C 26) D Version 1 57 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 27) A 28) D 29) A 30) A 31) A 32) B 33) C 34) D 35) A 36) A 37) B 38) C 39) B 40) C Version 1 58 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 41) A 42) D 43) A 44) B 45) C 46) D 47) B 48) A 49) C 50) D 51) C 52) D 53) A 54) A Version 1 59 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 55) B 56) C 57) D 58) D 59) D 60) A 61) B 62) C 63) A 64) B 65) C 66) A 67) A 68) B Version 1 60 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 69) C 70) D 71) D 72) A 73) C 74) B 75) B 76) D 77) D 78) A 79) D 80) B 81) C 82) D Version 1 61 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 83) A 84) B 85) C 86) D 87) A 88) A 89) B 90) C 91) A 92) B 93) A 94) B 95) A 96) D Version 1 62 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 97) A 98) B 99) D 100) D 101) A 102) C 103) B 104) A 105) A 106) C 107) D 108) TRUE 109) TRUE 110) FALSE Version 1 63 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 111) TRUE 112) FALSE 113) TRUE 114) TRUE 115) TRUE 116) TRUE 117) TRUE 118) FALSE 119) TRUE 120) TRUE 121) TRUE 122) TRUE 123) TRUE 124) TRUE Version 1 64 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 125) TRUE 126) TRUE 127) TRUE 128) TRUE 129) TRUE 130) TRUE 131) TRUE 132) TRUE 133) TRUE 134) FALSE 135) FALSE 136) FALSE 137) TRUE 138) FALSE Version 1 65 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 139) FALSE 140) TRUE 141) TRUE 142) TRUE 143) TRUE 144) FALSE 145) TRUE 146) TRUE 147) TRUE 148) FALSE 149) TRUE 150) TRUE 151) FALSE 152) TRUE Version 1 66 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 153) FALSE 154) TRUE 155) TRUE 156) TRUE 157) FALSE 158) TRUE 159) TRUE 160) TRUE 161) FALSE 162) TRUE 163) TRUE 164) TRUE 165) TRUE 166) TRUE Version 1 67 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول الملفات‬ 167) TRUE 168) TRUE 169) TRUE 170) FALSE 171) TRUE 172) TRUE 173) TRUE 174) FALSE 175) TRUE Version 1 68

Use Quizgecko on...
Browser
Browser