1.enterprise applications. 2.Internet technologies. 3.intranet technologies. 4.Windows operating...

40
1. 1. enterprise applications. enterprise applications. 2. 2. Internet technologies. Internet technologies. 3. 3. intranet technologies. intranet technologies. 4. 4. Windows operating systems. Windows operating systems. 5. 5. Linux operating systems. Linux operating systems. In many companies, In many companies, disparate networks disparate networks are moving toward a are moving toward a single common single common foundation based on… foundation based on…

Transcript of 1.enterprise applications. 2.Internet technologies. 3.intranet technologies. 4.Windows operating...

1.1. enterprise applications.enterprise applications.

2.2. Internet technologies.Internet technologies.

3.3. intranet technologies.intranet technologies.

4.4. Windows operating systems.Windows operating systems.

5.5. Linux operating systems. Linux operating systems.

In many companies, In many companies,

disparate networks are disparate networks are

moving toward a single moving toward a single

common foundation based common foundation based

on… on…

1.1. enterprise applications.enterprise applications.

2.2. Internet technologies.Internet technologies.

3.3. intranet technologies.intranet technologies.

4.4. Windows operating systems.Windows operating systems.

5.5. Linux operating systems.Linux operating systems.

In many companies, In many companies,

disparate networks are disparate networks are

moving toward a single moving toward a single

common foundation based common foundation based

on…on…

One of the major problems facing corporations today is how to integrate all the different One of the major problems facing corporations today is how to integrate all the different communication networks and channels into a coherent system that enables information communication networks and channels into a coherent system that enables information to flow from one part of the corporation to another, from one system to another.to flow from one part of the corporation to another, from one system to another.

1.1. Rapid technological innovationRapid technological innovation

2.2. Rapid growth in wireless Rapid growth in wireless technologiestechnologies

3.3. Rapid growth in broadband Rapid growth in broadband connectionsconnections

4.4. Telecommunications Telecommunications deregulationderegulation

5.5. Not sureNot sure

Which of the following Which of the following

communication trends communication trends

has created many has created many

alternatives for local alternatives for local

phone service?phone service?

1.1. Rapid technological innovationRapid technological innovation

2.2. Rapid growth in wireless Rapid growth in wireless technologiestechnologies

3.3. Rapid growth in broadband Rapid growth in broadband connectionsconnections

4.4. Telecommunications Telecommunications deregulationderegulation

5.5. Not sureNot sure

Which of the following Which of the following

communication trends communication trends

has created many has created many

alternatives for local alternatives for local

phone service?phone service?

Continuing telecommunications deregulation has encouraged competition, Continuing telecommunications deregulation has encouraged competition, lowered prices in long-distance telephone service, and created many alternatives lowered prices in long-distance telephone service, and created many alternatives for local phone service such as wireless, cable, and Internet telephones.for local phone service such as wireless, cable, and Internet telephones.

1.1. more work will be done.more work will be done.

2.2. less work will be done.less work will be done.

3.3. greater its value.greater its value.

4.4. the less its value.the less its value.

5.5. Not sureNot sure

According to According to

Metcalfe’s Law, the Metcalfe’s Law, the

more people more people

participating in a participating in a

network, the …network, the …

1.1. more work will be done.more work will be done.

2.2. less work will be done.less work will be done.

3.3. greater its value.greater its value.

4.4. the less its value.the less its value.

5.5. Not sureNot sure

According to According to

Metcalfe’s Law, the Metcalfe’s Law, the

more people more people

participating in a participating in a

network, the …network, the …

Mr. Metcalfe, founder of Netscape Communications in 1992, argued that the Internet would grow exponentially because the value of the network to individuals grows exponentially as the network adds members.

1.1. Improved temporal barriersImproved temporal barriers

2.2. Higher quality decisionsHigher quality decisions

3.3. Declining agency costsDeclining agency costs

4.4. Increased agilityIncreased agility

5.5. Declining geographical Declining geographical barriersbarriers

Which of the following Which of the following

is is notnot a business value a business value

impact of the impact of the

telecommunications telecommunications

revolution?revolution?

1.1. Improved temporal barriersImproved temporal barriers

2.2. Higher quality decisionsHigher quality decisions

3.3. Declining agency costsDeclining agency costs

4.4. Increased agilityIncreased agility

5.5. Declining geographical Declining geographical barriersbarriers

Which of the following Which of the following

is is notnot a business value a business value

impact of the impact of the

telecommunications telecommunications

revolution?revolution?

The telecommunications revolution has resulted in declining temporal barriers meaning that some goods such as software can be produced around the clock, seven days a week.

1.1. computer network interface.computer network interface.

2.2. computer interface device.computer interface device.

3.3. broadband connection.broadband connection.

4.4. high-speed interface card.high-speed interface card.

5.5. network interface card.network interface card.

Each computer on a Each computer on a

network contains a network contains a

network interface network interface

device called a…device called a…

1.1. computer network interface.computer network interface.

2.2. computer interface device.computer interface device.

3.3. broadband connection.broadband connection.

4.4. high-speed interface card.high-speed interface card.

5.5. network interface card.network interface card.

Each computer on a Each computer on a

network contains a network contains a

network interface network interface

device called a…device called a…

Most personal computers have a network interface card built into the motherboard.

1.1. hub.hub.

2.2. switch.switch.

3.3. router.router.

4.4. network operating system.network operating system.

5.5. protocol.protocol.

A special communications A special communications

processor used to route processor used to route

packets of data through packets of data through

different networks is a… different networks is a…

1.1. hub.hub.

2.2. switch.switch.

3.3. router.router.

4.4. network operating system.network operating system.

5.5. protocol.protocol.

A special communications A special communications

processor used to route processor used to route

packets of data through packets of data through

different networks is a…different networks is a…

A router ensures that messages sent across a network get to the correct address.

1.1. parcel slicing.parcel slicing.

2.2. parcel switching.parcel switching.

3.3. packet switching.packet switching.

4.4. packet slicing.packet slicing.

5.5. packet routing.packet routing.

A method of slicing A method of slicing

digital messages into digital messages into

parcels and then parcels and then

sending them through sending them through

a network using a network using

different paths is different paths is

called… called…

1.1. parcel slicing.parcel slicing.

2.2. parcel switching.parcel switching.

3.3. packet switching.packet switching.

4.4. packet slicing.packet slicing.

5.5. packet routing.packet routing.

A method of slicing A method of slicing

digital messages into digital messages into

parcels and then parcels and then

sending them through sending them through

a network using a network using

different paths is different paths is

called…called…

Packets are reassembled into the original, coherent message once they arrive at their destination.

1.1. NIC.NIC.

2.2. TCP/IP.TCP/IP.

3.3. OSI.OSI.

4.4. DWDM.DWDM.

5.5. Wi-Fi.Wi-Fi.

Corporate networks are Corporate networks are

using a single, common, using a single, common,

worldwide standard known worldwide standard known

as…as…

1.1. NIC.NIC.

2.2. TCP/IP.TCP/IP.

3.3. OSI.OSI.

4.4. DWDM.DWDM.

5.5. Wi-Fi.Wi-Fi.

Corporate networks are Corporate networks are

using a single, common, using a single, common,

worldwide standard known worldwide standard known

as…as…

Transmission Control Protocol/Internet Protocol provides a universally agreed-on method for breaking up digital messages into packets, routing them to the proper addresses, and then reassembling them into coherent messages.

1.1. Application layerApplication layer

2.2. Transport layerTransport layer

3.3. Internet layerInternet layer

4.4. Operating system layerOperating system layer

5.5. Network layerNetwork layer

Which of the following is Which of the following is

notnot one of the four layers one of the four layers

of the TCP/IP reference of the TCP/IP reference

model for model for

communications?communications?

1.1. Application layerApplication layer

2.2. Transport layerTransport layer

3.3. Internet layerInternet layer

4.4. Operating system layerOperating system layer

5.5. Network layerNetwork layer

Which of the following is Which of the following is

notnot one of the four layers one of the four layers

of the TCP/IP reference of the TCP/IP reference

model for model for

communications?communications?

Data from one computer to the other passes downward through all four layers, starting with the sending computer’s application layer and passing through the network interface layer.

1.1. switches.switches.

2.2. open systems model.open systems model.

3.3. dense wavelength division dense wavelength division multiplexing.multiplexing.

4.4. protocols.protocols.

5.5. Not sureNot sure

A set of rules and A set of rules and

procedures governing procedures governing

transmission of transmission of

information between information between

two points in a network two points in a network

is called… is called…

1.1. switches.switches.

2.2. open systems model.open systems model.

3.3. dense wavelength division dense wavelength division multiplexing.multiplexing.

4.4. protocols.protocols.

5.5. Not sureNot sure

A set of rules and A set of rules and

procedures governing procedures governing

transmission of transmission of

information between information between

two points in a network two points in a network

is called…is called…

Different components in a network can communicate with each other only by adhering to a common set of rules called protocols.

1.1. fiber-optic cable.fiber-optic cable.

2.2. coaxial cable.coaxial cable.

3.3. twisted wire.twisted wire.

4.4. optical broadband.optical broadband.

5.5. microwave cable.microwave cable.

The physical transmission The physical transmission

media type that consists media type that consists

of thickly insulated and of thickly insulated and

shielded copper wire is…shielded copper wire is…

1.1. fiber-optic cable.fiber-optic cable.

2.2. coaxial cable.coaxial cable.

3.3. twisted wire.twisted wire.

4.4. optical broadband.optical broadband.

5.5. microwave cable.microwave cable.

The physical transmission The physical transmission

media type that consists media type that consists

of thickly insulated and of thickly insulated and

shielded copper wire is…shielded copper wire is…

Twisted wire consists of strands of copper wire twisted in pairs and is the oldest electronic transmission medium. Fiber-optic cable consists of strands of clear glass fiber.

1.1. Cable modemsCable modems

2.2. Digital subscriber linesDigital subscriber lines

3.3. MicrowavesMicrowaves

4.4. T-1 linesT-1 lines

5.5. Not sureNot sure

Which of the following Which of the following

operates over existing operates over existing

copper telephone lines to copper telephone lines to

carry voice, data, and carry voice, data, and

video?video?

1.1. Cable modemsCable modems

2.2. Digital subscriber linesDigital subscriber lines

3.3. MicrowavesMicrowaves

4.4. T-1 linesT-1 lines

5.5. Not sureNot sure

Which of the following Which of the following

operates over existing operates over existing

copper telephone lines to copper telephone lines to

carry voice, data, and carry voice, data, and

video?video?

DSL has two categories: Asymmetric DSL supports a transmission rate of 1.5 to 1.9 Mbps when receiving data and up to 640 Kbps when sending data. Symmetric DSL supports the same transmission rate for sending and receiving data of up to 3 Mbps.

1.1. IP address.IP address.

2.2. TCP address.TCP address.

3.3. OSI address.OSI address.

4.4. DSL address.DSL address.

5.5. Not sure Not sure

Every computer on the Every computer on the

Internet is assigned a Internet is assigned a

unique… unique…

1.1. IP address.IP address.

2.2. TCP address.TCP address.

3.3. OSI address.OSI address.

4.4. DSL address.DSL address.

5.5. Not sureNot sure

Every computer on the Every computer on the

Internet is assigned a Internet is assigned a

unique…unique…

The IP address is a 32-bit number represented by four strings of numbers and ranging from 0 to 255.

1.1. Network operating systemNetwork operating system

2.2. TCP/IP TCP/IP

3.3. Internet governance systemInternet governance system

4.4. Domain name systemDomain name system

5.5. Internet service system Internet service system

Which system converts IP Which system converts IP

addresses to domain addresses to domain

names? names?

1.1. Network operating systemNetwork operating system

2.2. TCP/IP TCP/IP

3.3. Internet governance systemInternet governance system

4.4. Domain name systemDomain name system

5.5. Internet service system Internet service system

Which system converts IP Which system converts IP

addresses to domain addresses to domain

names?names?

A domain name is the English-like name that corresponds to the unique 32-bit numeric IP address for each computer connected to the Internet.

1.1. TelnetTelnet

2.2. File Transfer ProtocolFile Transfer Protocol

3.3. World Wide WebWorld Wide Web

4.4. Usenet newsgroupsUsenet newsgroups

5.5. Infodata transferInfodata transfer

Which of the following is Which of the following is

notnot an Internet service an Internet service

to which a client to which a client

computer has access? computer has access?

1.1. TelnetTelnet

2.2. File Transfer ProtocolFile Transfer Protocol

3.3. World Wide WebWorld Wide Web

4.4. Usenet newsgroupsUsenet newsgroups

5.5. Infodata transferInfodata transfer

Which of the following is Which of the following is

notnot an Internet service to an Internet service to

which a client computer which a client computer

has access?has access?

Each Internet service is implemented by one or more software programs. All of the services may run on a single server computer, or different services may be allocated to different machines.

1.1. UbiquityUbiquity

2.2. RichnessRichness

3.3. Hardware platformHardware platform

4.4. CustomizationCustomization

5.5. Information densityInformation density

Which of the following is Which of the following is

notnot a unique feature of a unique feature of

Internet technology?Internet technology?

1.1. UbiquityUbiquity

2.2. RichnessRichness

3.3. Hardware platformHardware platform

4.4. CustomizationCustomization

5.5. Information densityInformation density

Which of the following is Which of the following is

notnot a unique feature of a unique feature of

Internet technology?Internet technology?

The Internet is unique and very different from any other networking technology developed in the past. These unique features translate directly into business value for all businesses, worldwide, whether they are small or large.

1.1. XML.XML.

2.2. HTML.HTML.

3.3. HTPM.HTPM.

4.4. HTTP.HTTP.

5.5. FTP.FTP.

The communications The communications

standard used to transfer standard used to transfer

pages on the Web is…pages on the Web is…

1.1. XML.XML.

2.2. HTML.HTML.

3.3. HTPM.HTPM.

4.4. HTTP.HTTP.

5.5. FTP.FTP.

The communications The communications

standard used to transfer standard used to transfer

pages on the Web is…pages on the Web is…

Web pages are accessible through the Internet because Web browser software on your computer can request Web pages stored on an Internet host server using the Hypertext Transfer Protocol (HTTP).

1.1. Enterprise softwareEnterprise software

2.2. Search engineSearch engine

3.3. FTPFTP

4.4. Web serversWeb servers

5.5. Telnet Telnet

Which of the following Which of the following

contains software that contains software that

looks for Web pages looks for Web pages

containing one or more containing one or more

search terms?search terms?

1.1. Enterprise softwareEnterprise software

2.2. Search engineSearch engine

3.3. FTPFTP

4.4. Web serversWeb servers

5.5. Telnet Telnet

Which of the following Which of the following

contains software that contains software that

looks for Web pages looks for Web pages

containing one or more containing one or more

search terms?search terms?

Once the search engine finds appropriate Web pages, the matches are displayed in a results list according to relevancy.

1.1. Overture.Overture.

2.2. AOL.AOL.

3.3. Google.Google.

4.4. Yahoo.Yahoo.

5.5. Altavista.Altavista.

The most popular Web The most popular Web

search tool is…search tool is…

1.1. Overture.Overture.

2.2. AOL.AOL.

3.3. Google.Google.

4.4. Yahoo.Yahoo.

5.5. Altavista.Altavista.

The most popular Web The most popular Web

search tool is…search tool is…

Google has become overwhelmingly the most popular Web search tool and is used for about 55 percent of all searches on the Web through its own site.

1.1. TelnetTelnet

2.2. VoIPVoIP

3.3. FTPFTP

4.4. HTTPHTTP

5.5. VPNVPN

Which of the following Which of the following

uses the Internet Protocol uses the Internet Protocol

to deliver voice to deliver voice

information in digital information in digital

form? form?

1.1. TelnetTelnet

2.2. VoIPVoIP

3.3. FTPFTP

4.4. HTTPHTTP

5.5. VPNVPN

Which of the following Which of the following

uses the Internet Protocol uses the Internet Protocol

to deliver voice to deliver voice

information in digital information in digital

form?form?

Voice over Internet Protocol (VoIP) uses the IP to deliver voice information in digital form using packet switching, avoiding the tolls charged by local and long-distance telephone networks.