Filters
Question type

Study Flashcards

________ monetizes the value of the data stored by search engines.


A) TCP/IP
B) RSS
C) WiMax
D) IoT
E) Search Engine Marketing

F) A) and D)
G) A) and C)

Correct Answer

verifed

verified

One or more access points positioned on a ceiling,wall,or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as:


A) touch points.
B) netcenters.
C) hot points.
D) wireless hubs.
E) hotspots.

F) B) and C)
G) A) and E)

Correct Answer

verifed

verified

What service converts IP addresses into more recognizable alphanumeric names?


A) HTML
B) FTP
C) IP
D) HTTP
E) DNS

F) A) and B)
G) A) and C)

Correct Answer

verifed

verified

Which of the following pulls content from websites and feeds it automatically to a user's computers?


A) FTP
B) RSS
C) HTTP
D) Bluetooth
E) IPv6

F) B) and D)
G) A) and B)

Correct Answer

verifed

verified

Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not a characteristic of packet switching?


A) Packets travel independently of each other.
B) Packets are routed through many different paths.
C) Packet switching requires point-to-point circuits.
D) Packets include data for checking transmission errors.
E) Packets are reassembled into the original message when they reach their destinations.

F) A) and D)
G) A) and C)

Correct Answer

verifed

verified

The WiMax standard can transmit up to a distance of approximately:


A) 30 meters.
B) 500 meters.
C) 30 miles.
D) 5 miles.
E) 70 miles.

F) A) and B)
G) C) and E)

Correct Answer

verifed

verified

4G networks use which of the following standards?


A) GSM and LTD
B) CDMA and PAN
C) LTE and LTD
D) T-Mobile and AT&T
E) LTE and WiMax

F) All of the above
G) A) and E)

Correct Answer

verifed

verified

What has made the Google search engine so successful?

Correct Answer

verifed

verified

The Google search engine became so succe...

View Answer

In the domain name "http://books.azimuth-interactive.com",which element is the second-level domain?


A) books
B) azimuth-interactive.com
C) com
D) none;there is no second-level domain in this name
E) books.azimuth-interactive

F) B) and E)
G) A) and B)

Correct Answer

verifed

verified

How does packet switching work?

Correct Answer

verifed

verified

Packet switching is a method of slicing ...

View Answer

Central large mainframe computing has largely replaced client/server computing.

A) True
B) False

Correct Answer

verifed

verified

The backbone networks of the Internet are typically owned by long-distance telephone companies called:


A) regional network providers.
B) enhanced service providers.
C) internet bulk providers.
D) backbone providers.
E) network service providers.

F) B) and E)
G) C) and D)

Correct Answer

verifed

verified

Which of the following statements is not true about search engines?


A) They are arguably the Internet's "killer app."
B) They have solved the problem of how users instantly find information on the Internet.
C) They are monetized almost exclusively by search engine marketing.
D) There are hundreds of search engines vying for user attention,with no clear leader having yet emerged.
E) Users are increasingly using search engines on mobile devices.

F) None of the above
G) B) and D)

Correct Answer

verifed

verified

Blogs,wikis,and social networking sites were designed for individuals to communicate with each other.What uses do businesses have for these tools? Give specific examples.

Correct Answer

verifed

verified

Businesses can use these tools to reach ...

View Answer

The telephone system is an example of a ________ network.


A) peer-to-peer
B) wireless
C) packet-switched
D) circuit-switched
E) client/server

F) A) and E)
G) A) and D)

Correct Answer

verifed

verified

Which of the following is a device that acts as a connection point between computers and can filter and forward data to a specified destination?


A) Hub
B) Switch
C) Router
D) NIC
E) Modem

F) A) and E)
G) B) and C)

Correct Answer

verifed

verified

Web browser software requests web pages from the Internet using which of the following protocols?


A) URL
B) HTTP
C) DNS
D) HTML
E) FTP

F) A) and C)
G) B) and D)

Correct Answer

verifed

verified

NFC tags are always passive.

A) True
B) False

Correct Answer

verifed

verified

VoIP technology delivers voice information in digital form using packet switching.

A) True
B) False

Correct Answer

verifed

verified

Showing 41 - 60 of 100

Related Exams

Show Answer