Presentation is loading. Please wait.

Presentation is loading. Please wait.

1.enterprise applications. 2.Internet technologies. 3.intranet technologies. 4.Windows operating systems. 5.Linux operating systems. In many companies,

Similar presentations


Presentation on theme: "1.enterprise applications. 2.Internet technologies. 3.intranet technologies. 4.Windows operating systems. 5.Linux operating systems. In many companies,"— Presentation transcript:

1 1.enterprise applications. 2.Internet technologies. 3.intranet technologies. 4.Windows operating systems. 5.Linux operating systems. In many companies, disparate networks are moving toward a single common foundation based on…

2 1.enterprise applications. 2.Internet technologies. 3.intranet technologies. 4.Windows operating systems. 5.Linux operating systems. In many companies, disparate networks are moving toward a single common foundation based on… One of the major problems facing corporations today is how to integrate all the different communication networks and channels into a coherent system that enables information to flow from one part of the corporation to another, from one system to another.

3 1.Rapid technological innovation 2.Rapid growth in wireless technologies 3.Rapid growth in broadband connections 4.Telecommunications deregulation 5.Not sure Which of the following communication trends has created many alternatives for local phone service?

4 1.Rapid technological innovation 2.Rapid growth in wireless technologies 3.Rapid growth in broadband connections 4.Telecommunications deregulation 5.Not sure Which of the following communication trends has created many alternatives for local phone service? Continuing telecommunications deregulation has encouraged competition, lowered prices in long-distance telephone service, and created many alternatives for local phone service such as wireless, cable, and Internet telephones.

5 1.more work will be done. 2.less work will be done. 3.greater its value. 4.the less its value. 5.Not sure According to Metcalfe’s Law, the more people participating in a network, the …

6 1.more work will be done. 2.less work will be done. 3.greater its value. 4.the less its value. 5.Not sure According to Metcalfe’s Law, the more people participating in a network, the … Mr. Metcalfe, founder of Netscape Communications in 1992, argued that the Internet would grow exponentially because the value of the network to individuals grows exponentially as the network adds members.

7 1.Improved temporal barriers 2.Higher quality decisions 3.Declining agency costs 4.Increased agility 5.Declining geographical barriers Which of the following is not a business value impact of the telecommunications revolution?

8 1.Improved temporal barriers 2.Higher quality decisions 3.Declining agency costs 4.Increased agility 5.Declining geographical barriers Which of the following is not a business value impact of the telecommunications revolution? The telecommunications revolution has resulted in declining temporal barriers meaning that some goods such as software can be produced around the clock, seven days a week.

9 1.computer network interface. 2.computer interface device. 3.broadband connection. 4.high-speed interface card. 5.network interface card. Each computer on a network contains a network interface device called a…

10 1.computer network interface. 2.computer interface device. 3.broadband connection. 4.high-speed interface card. 5.network interface card. Each computer on a network contains a network interface device called a… Most personal computers have a network interface card built into the motherboard.

11 1.hub. 2.switch. 3.router. 4.network operating system. 5.protocol. A special communications processor used to route packets of data through different networks is a…

12 1.hub. 2.switch. 3.router. 4.network operating system. 5.protocol. A special communications processor used to route packets of data through different networks is a… A router ensures that messages sent across a network get to the correct address.

13 1.parcel slicing. 2.parcel switching. 3.packet switching. 4.packet slicing. 5.packet routing. A method of slicing digital messages into parcels and then sending them through a network using different paths is called…

14 1.parcel slicing. 2.parcel switching. 3.packet switching. 4.packet slicing. 5.packet routing. A method of slicing digital messages into parcels and then sending them through a network using different paths is called… Packets are reassembled into the original, coherent message once they arrive at their destination.

15 1.NIC. 2.TCP/IP. 3.OSI. 4.DWDM. 5.Wi-Fi. Corporate networks are using a single, common, worldwide standard known as…

16 1.NIC. 2.TCP/IP. 3.OSI. 4.DWDM. 5.Wi-Fi. Corporate networks are using a single, common, worldwide standard known as… Transmission Control Protocol/Internet Protocol provides a universally agreed-on method for breaking up digital messages into packets, routing them to the proper addresses, and then reassembling them into coherent messages.

17 1.Application layer 2.Transport layer 3.Internet layer 4.Operating system layer 5.Network layer Which of the following is not one of the four layers of the TCP/IP reference model for communications?

18 1.Application layer 2.Transport layer 3.Internet layer 4.Operating system layer 5.Network layer Which of the following is not one of the four layers of the TCP/IP reference model for communications? Data from one computer to the other passes downward through all four layers, starting with the sending computer’s application layer and passing through the network interface layer.

19 1.switches. 2.open systems model. 3.dense wavelength division multiplexing. 4.protocols. 5.Not sure A set of rules and procedures governing transmission of information between two points in a network is called…

20 1.switches. 2.open systems model. 3.dense wavelength division multiplexing. 4.protocols. 5.Not sure A set of rules and procedures governing transmission of information between two points in a network is called… Different components in a network can communicate with each other only by adhering to a common set of rules called protocols.

21 1.fiber-optic cable. 2.coaxial cable. 3.twisted wire. 4.optical broadband. 5.microwave cable. The physical transmission media type that consists of thickly insulated and shielded copper wire is…

22 1.fiber-optic cable. 2.coaxial cable. 3.twisted wire. 4.optical broadband. 5.microwave cable. The physical transmission media type that consists of thickly insulated and shielded copper wire is… Twisted wire consists of strands of copper wire twisted in pairs and is the oldest electronic transmission medium. Fiber-optic cable consists of strands of clear glass fiber.

23 1.Cable modems 2.Digital subscriber lines 3.Microwaves 4.T-1 lines 5.Not sure Which of the following operates over existing copper telephone lines to carry voice, data, and video?

24 1.Cable modems 2.Digital subscriber lines 3.Microwaves 4.T-1 lines 5.Not sure Which of the following operates over existing copper telephone lines to carry voice, data, and video? DSL has two categories: Asymmetric DSL supports a transmission rate of 1.5 to 1.9 Mbps when receiving data and up to 640 Kbps when sending data. Symmetric DSL supports the same transmission rate for sending and receiving data of up to 3 Mbps.

25 1.IP address. 2.TCP address. 3.OSI address. 4.DSL address. 5.Not sure Every computer on the Internet is assigned a unique…

26 1.IP address. 2.TCP address. 3.OSI address. 4.DSL address. 5.Not sure Every computer on the Internet is assigned a unique… The IP address is a 32-bit number represented by four strings of numbers and ranging from 0 to 255.

27 1.Network operating system 2.TCP/IP 3.Internet governance system 4.Domain name system 5.Internet service system Which system converts IP addresses to domain names?

28 1.Network operating system 2.TCP/IP 3.Internet governance system 4.Domain name system 5.Internet service system Which system converts IP addresses to domain names? A domain name is the English-like name that corresponds to the unique 32-bit numeric IP address for each computer connected to the Internet.

29 1.Telnet 2.File Transfer Protocol 3.World Wide Web 4.Usenet newsgroups 5.Infodata transfer Which of the following is not an Internet service to which a client computer has access?

30 1.Telnet 2.File Transfer Protocol 3.World Wide Web 4.Usenet newsgroups 5.Infodata transfer Which of the following is not an Internet service to which a client computer has access? Each Internet service is implemented by one or more software programs. All of the services may run on a single server computer, or different services may be allocated to different machines.

31 1.Ubiquity 2.Richness 3.Hardware platform 4.Customization 5.Information density Which of the following is not a unique feature of Internet technology?

32 1.Ubiquity 2.Richness 3.Hardware platform 4.Customization 5.Information density Which of the following is not a unique feature of Internet technology? The Internet is unique and very different from any other networking technology developed in the past. These unique features translate directly into business value for all businesses, worldwide, whether they are small or large.

33 1.XML. 2.HTML. 3.HTPM. 4.HTTP. 5.FTP. The communications standard used to transfer pages on the Web is…

34 1.XML. 2.HTML. 3.HTPM. 4.HTTP. 5.FTP. The communications standard used to transfer pages on the Web is… Web pages are accessible through the Internet because Web browser software on your computer can request Web pages stored on an Internet host server using the Hypertext Transfer Protocol (HTTP).

35 1.Enterprise software 2.Search engine 3.FTP 4.Web servers 5.Telnet Which of the following contains software that looks for Web pages containing one or more search terms?

36 1.Enterprise software 2.Search engine 3.FTP 4.Web servers 5.Telnet Which of the following contains software that looks for Web pages containing one or more search terms? Once the search engine finds appropriate Web pages, the matches are displayed in a results list according to relevancy.

37 1.Overture. 2.AOL. 3.Google. 4.Yahoo. 5.Altavista. The most popular Web search tool is…

38 1.Overture. 2.AOL. 3.Google. 4.Yahoo. 5.Altavista. The most popular Web search tool is… Google has become overwhelmingly the most popular Web search tool and is used for about 55 percent of all searches on the Web through its own site.

39 1.Telnet 2.VoIP 3.FTP 4.HTTP 5.VPN Which of the following uses the Internet Protocol to deliver voice information in digital form?

40 1.Telnet 2.VoIP 3.FTP 4.HTTP 5.VPN Which of the following uses the Internet Protocol to deliver voice information in digital form? Voice over Internet Protocol (VoIP) uses the IP to deliver voice information in digital form using packet switching, avoiding the tolls charged by local and long-distance telephone networks.


Download ppt "1.enterprise applications. 2.Internet technologies. 3.intranet technologies. 4.Windows operating systems. 5.Linux operating systems. In many companies,"

Similar presentations


Ads by Google