Ask a New Question
Search
Questions and answers by
KO
Questions (385)
Which statement is true of geographic top-level domains (TLDs)?
Question 12 options: They are used to promote business and
1 answer
46 views
James gets a job at a multinational corporation. On his first day at work, he finds out that the numerical code assigned by the
1 answer
50 views
A routing table lists _____.
Question 10 options: nodes on a network the IP address of a router the protocols that each node
1 answer
60 views
Which layer of the Open Systems Interconnection (OSI) model formats message packets?
Question 9 options: Session Application
1 answer
62 views
Identify an advantage of the bus topology.
Question 8 options: It makes fault diagnosis easy. It detects problems easily due to
1 answer
62 views
A network _____ represents a network’s physical layout.
Question 7 options: utility packet protocol topology
1 answer
61 views
_____ are glass tubes surrounded by concentric layers of glass, called “cladding,” to form a light path through wire cables.
1 answer
70 views
In the past, ________ networks were used to transmit voice, video, and data.
Question 5 options: separate integrated converged
1 answer
37 views
_____ allows the linking of devices running on many different platforms.
Question 4 options: Time Division Multiple Access
1 answer
66 views
In the context of data communication, which is true of convergence?
Question 3 options: It changes the path that data takes each
1 answer
59 views
A network interface card (NIC) operates at the Open Systems Interconnection (OSI) model’s _____ layers.
Question 2 options:
1 answer
57 views
Internet Protocol (IP) operates at the _____ of the Open Systems Interconnection (OSI) model.
Question 1 options: Transport layer
1 answer
69 views
Which statement is true of the Internet?
Question 20 options: Its accessibility requires prior approval. Its geographical scope
1 answer
53 views
Which statement is true of an intranet in an organization?
Question 19 options: It can be used by trusted business partners with
1 answer
62 views
Which is also known as “the Semantic Web”?
Question 18 options: Web 1.1 Web 1.0 Web 2.0 Web 3.0
1 answer
49 views
A _____ is a type of Web site that allows users to add, delete, and sometimes modify content.
Question 17 options: wiki blog
1 answer
63 views
In the context of extranets, which of the following is considered an interorganizational system?
Question 16 options: Wikis Sales
1 answer
46 views
An advantage of an intranet is that the organization can specify a(n) _______ that supports the technologies the organization
1 answer
48 views
In a typical intranet configuration, the ___________ must define each user’s level of access.
Question 14 options: DBMS Human
1 answer
49 views
Which statement is true of Voice over Internet Protocol (VoIP)?
Question 13 options: Users often experience busy lines. Callers
1 answer
54 views
A _____ is an electronic audio file that is posted on the Web for users to download to their mobile devices or their computers.
Q
1 answer
59 views
Joey, a businessman, designs cases and covers for cell phones. He wishes to showcase his products so that more people know about
1 answer
37 views
_____ are used to connect computers, hubs, switches, and routers to a network in a local area network (LAN).
Question 10 options:
1 answer
61 views
Which statement is true of the types of client/server architectures?
Question 9 options: An n-tier architecture tests software
1 answer
54 views
Identify a true statement about the different forms of sender and receiver devices.
Question 8 options: Thin clients have no
1 answer
50 views
_____ is a set of rules that governs data communication, including error detection, message length, and transmission speed.
Quest
1 answer
71 views
One way to improve the security of a Wi-Fi network is to ___________.
Question 6 options: enable WPA2 encryption maintain the
1 answer
48 views
A(n) _____ is a network connection device that can build tables that identify addresses on each network.
Question 5 options:
1 answer
58 views
All client computers that try to access an access point are required to include an _____ in all their packets.
Question 4
1 answer
36 views
One disadvantage of the BYOD strategy is the potential for __________.
Question 3 options: cost savings increased flexibility
1 answer
38 views
Identify a topology used by traditional mainframe networks.
Question 2 options: A ring topology A star topology A mesh topology A
1 answer
76 views
A _____ is a hardware device that allows several nodes to share one communication channel.
Question 1 options: multiplexer
1 answer
51 views
The city of Copenhagen used the Internet of Things to reduce water loss by implementing _____.
Question 20 options: email
1 answer
61 views
_____ is an Internet service for communicating with others via a private “chat room” on the Internet.
Question 19 options:
1 answer
77 views
_____ check to see what links are on the user’s Web page and make sure they work; if a link is broken, they identify it and
1 answer
70 views
A _____ is a journal or newsletter that is updated frequently and intended for the general public.
Question 17 options: wiki
1 answer
46 views
Compared to campus-based learning, MOOCs offer __________.
Question 16 options: higher costs per course lower costs and greater
1 answer
44 views
The _____ denotes the type of organization or country the address of a document or site on the Internet specifies.
Question 15
1 answer
63 views
Microsoft Edge, Mozilla Firefox, Google Chrome, Apple Safari, and Opera are examples of _____.
Question 14 options: operating
1 answer
66 views
An organization's extranet server is typically placed in a network area called the ______ that is separate from the LAN.
Question
1 answer
31 views
_____ is a service that uses the Internet rather than the telephone network to exchange spoken conversations.
Question 11
1 answer
53 views
Which of the following is true of the 3G network?
Question 10 options: Has less advanced network capacity than 2G Is unable to
1 answer
65 views
_____ is a voice-grade transmission channel capable of transmitting a maximum of 56,000 bps.
Question 9 options: Narrowband
1 answer
38 views
In the bus topology, a hardware device called a _____ is used at each end of the cable to absorb the transmitted signal.
Question
1 answer
58 views
A _____ works well for companies that are geographically dispersed.
Question 7 options: ring topology star topology mesh topology
1 answer
70 views
In data communication, the _____ is a packet-switching service that operates at 25 Mbps and 622 Mbps, with maximum speed of up
1 answer
55 views
In the context of data communication, which of the following media is based on “line of sight”?
Question 5 options: A
1 answer
69 views
_____ is the amount of data that can be transferred from one point to another in one second.
Question 4 options: Bandwidth Packet
1 answer
56 views
In _____ data transmission, multiple pieces of data are sent simultaneously to increase the transmission rate.
Question 3
1 answer
59 views
In data communication, _____ refers to integrating voice, video, and data so that multimedia information can be used for
1 answer
58 views
In a(n) _____ topology, if any link between nodes is severed, the entire network is affected, and failure of a single node
3 answers
80 views
1+1-1*1/1=
1 answer
26 views
applications that Twitter has for businesses
1 answer
60 views
applications that Yelp has for businesses
1 answer
51 views
applications that Pinterest has for businesses
1 answer
48 views
applications that facebook has for businesses
1 answer
52 views
The applications of Twitter use in running a small business are
1 answer
47 views
Small as well as large businesses could use social networks to improve their efficiency and help their bottom lines. Discuss
1 answer
78 views
what is strike breaker
1 answer
47 views
• Transactional leaders
3 answers
35 views
COMPUTER AIDED IN BUSINESS
1 answer
43 views
Process layout in business
1 answer
46 views
Appraisals in business
1 answer
32 views
Labor unions in business
1 answer
42 views
Motivation theories in business
1 answer
51 views
SWOT analysis in business
1 answer
51 views
Leadership styles in business
1 answer
56 views
What are the levels of management in business
1 answer
35 views
1. Discuss the advantages and disadvantages of GoToMeeting, WebEx, and My Web Conferences.
2. What are some other popular on-line
3 answers
84 views
In the context of e-commerce transaction security measures, authentication is a critical factor because it ensures that:
Question
1 answer
62 views
_____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through the use of
1 answer
65 views
Which statement is true of application-filtering firewalls?
Question 8 options: They are less secure than packet-filtering
1 answer
96 views
In the context of security, _____ is an attack that takes advantage of the human element of security systems.
Question 7 options:
1 answer
73 views
Before establishing a security program, organizations should __________.
Question 6 options: check temperature and humidity
1 answer
53 views
As a physical security measure, _____.
Question 5 options: electronic trackers are attached to a computer at the power outlet
1 answer
47 views
The Committee on National Security Systems (CNSS) proposed a model known as the _____ for evaluating information security.
Questi
1 answer
61 views
In the context of computer and network security, _____ refers to the accuracy of information resources within an organization.
Qu
1 answer
57 views
_____ primarily control access to computers and networks and include devices for securing computers and peripherals from theft.
Q
1 answer
77 views
A(n) _____ is a combination of hardware and software that acts as a filter or barrier between a private network and external
1 answer
39 views
Denial of service (DoS) is among the security threats that have been on the rise in recent years.
1. Discuss recommendations for
1 answer
71 views
In the context of ethical issues of information technologies, restricting access to the Web is a type of _____.
Question 12
1 answer
63 views
Organizations can benefit from patents as they can use patents:
Question 11 options: for an unlimited period of time. for
1 answer
120 views
In a data warehouse, _____ is the process of collecting data from a variety of sources and converting it into a format that can
1 answer
69 views
In a relational database model, a _____ is a field in a relational table that matches the primary key column of another table.
Qu
1 answer
70 views
In a relational database model, the columns are called _____.
Question 8 options: attributes tuples branches roots
1 answer
53 views
A data mart is usually _______ a data warehouse.
Question 7 options: larger than the same size as smaller than more expensive
1 answer
65 views
In the context of the types of data in a database, which is a source of internal data?
Question 6 options: Tax records Sales
1 answer
74 views
In a _____ model, the relationships among records form a treelike structure.
Question 5 options: hierarchical relational network
1 answer
54 views
In comparison with flat file systems, databases:
Question 3 options: minimize data redundancy. are easier to design. have less
3 answers
56 views
The _____ stores data types for fields, default values for fields, and validation rules for data in each field.
Question 2
1 answer
104 views
In a(n) _____, records in files are organized and processed in numerical order.
Question 1 options: sequential access file
1 answer
87 views
Identify a true statement about information technology.
Question 20 options: It has increased clerical jobs. It has cut down
1 answer
69 views
In the 1997 Reno v. ACLU case, the U.S. Supreme Court unanimously voted to strike down the anti-indecency provisions of the
1 answer
69 views
In the context of information technology in workplaces, which allows adding new tasks to employees’ responsibilities?
Question
1 answer
64 views
Which of the following is not a key component of the General Data Protection Regulation (GDPR)?
Question 17 options: User consent
1 answer
68 views
In the context of Web and network privacy issues, new employees in an organization have to sign a(n) _____before they access the
1 answer
83 views
To minimize the invasion of privacy, organizations should:
Question 15 options: not delete data even when it is not needed. not
1 answer
75 views
In general, _____ last the author’s lifetime plus 70 years and do not need to be renewed.
Question 14 options: copyrights
1 answer
63 views
_____ permits you to use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews.
Quest
1 answer
75 views
The series of laws intended to protect European Union (EU) citizens’ personal data is referred to as the __________.
Question
1 answer
86 views
Pages
1
2
3
4