Anda di halaman 1dari 34

True or False

1. A communication channel is the media on which data, instructions, or informations travel.(T) 2. A web server is a computer that delivers requested Web pages to your computer. (T) 3. An intranet is an internal network that uses Internet technologies. (T) 4. The 40-Gigabit Ethernet standard is the fastest of the Ethernet standards. (F) 5. Bluetooth does not require line-of-sight transmission. (T) 6. At a distance of 10 meters (about 33 feet), the data transfer rate for UWB devices is 480 MBPS. (F) 7. Fiber to the Presmises (FTTP) uses fibre-optic cable to provide extremely high speed interney acess to the users physical permanent location. (T) 8. Latency is the time it takes a signal to travel from one location to another on a network. (T)

Chapter 09: Communications and Networks


1 out of 20

1. A(n) ____ modem usually is in the form of an adapter card that you insert in an expansion slot on a computer's motherboard. a. DSL b. ISDN c. dial-up d. cable
34

2 out of 20

2. Devices equipped with ____ ports transfer data at rates from 115 Kbps (thousand bits per second) to 4 Mbps between their ports. a. Bluetooth b. IrDA c. TCP/IP d. Ethernet
27 27

3 out of 20

3. Simple ____ applications include electronic publishing of organizational materials such as telephone directories, event calendars, procedure manuals, employee benefits information, and job postings. a. ring network b. extranet c. star network d. intranet
23 53

4 out of 20

4. Two types of wireless Internet access points are ____ and mobile wireless networks. a. SMS b. Web services c. hot spots d. TCP/IP
4 8

5 out of 20

5. Data, instructions, and information travel on a(n) ____. a. sending device b. receiving device c. analog device d. communications channel
1 1

6 out of 20

6. ____ use wire, cable, and other tangible materials to send communications signals. a. 802.11 b. Bluetooth c. IrDA d. Physical transmission media

45

43

7 out of 20

7. The server on a client/server network is sometimes called the ____ computer. a. node b. client c. host d. peer
14 17

8 out of 20

8. A(n) ____ extends the basic home network to include features such as lighting control, thermostat adjustment, and a security system. a. intelligent home network b. wireless home network c. phoneline network d. powerline cable network
40 42

9 out of 20

9. A high-speed network that connects local area networks in a city or town and handles the bulk of communications activity across that region is called a ____. a. wide area network (WAN) b. wireless LAN (WLAN) c. metropolitan area network (MAN) d. value-added network (VAN)
12 15

10 out of 20

10. Users who do not have other high-speed Internet access in their area can opt for ____. a. FTP b. fractional T1 c. WAP d. dial-up
34 32

11 out of 20

11. ____ is a type of application software used for communications. a. FTP software b. Word processing software c. Database software d. Image editing software
29 28

12 out of 20

12. ____ sometimes is referred to as wireless Ethernet because it uses techniques similar to the Ethernet standard to specify how physically to configure a wireless network. a. Wi-Fi b. TCP/IP c. IrDA d. Bluetooth
25 25

13 out of 20

13. On a ____, a cable forms a closed loop with all computers and devices arranged along the loop. a. ring network b. bus network c. star network d. bus ring network
22 52

14 out of 20

14. With ____, the data transfers between devices at a rate of up to 3 Mbps. a. TCP/IP b. Bluetooth c. Ethernet d. 802.11
26 24

15 out of 20

15. A central communications device that allows computers and devices to transfer data wirelessly among themselves is called a ____. a. network interface card b. wireless access point c. digital modem d. router
38 35

16 out of 20

16. A print server is an example of a(n) ____. a. Ethernet b. dedicated server c. client d. intranet
15 18

17 out of 20

17. To prevent unauthorized users from accessing files and computers, many routers are protected by a built-in ____. a. hub b. bridge c. switch

d. firewall
39 36

18 out of 20

18. A(n) ____ consists of individual electrical pulses that represent bits grouped into bytes. a. analog signal b. digital signal c. communications channel d. transmission medium
35 2

19 out of 20

19. ____ includes network hardware and software that enables group members to communicate, manage projects, schedule meetings, and make group decisions. a. Workgroup computing b. Web services c. Voicemail d. Voice over IP (VoIP)
6 7

20 out of 20

20. For successful communications, you need a(n) ____ that connects the communications channel to a receiving device. a. communications device b. analog signal c. sending device d. digital signal
2 3

Chapter 09: Communications and Networks

1 out of 20

1. The layout of the computers and devices in a communications network is called a(n) ____. a. network architecture b. communications satellite c. network topology d. intelligent network
20 49

2 out of 20

2. ____ is a type of application software used for communications. a. FTP software b. Word processing software c. Database software d. Image editing software
29 28

3 out of 20

3. Two types of wireless Internet access points are ____ and mobile wireless networks. a. SMS b. Web services c. hot spots d. TCP/IP
4 8

4 out of 20

4. A print server is an example of a(n) ____. a. Ethernet b. dedicated server c. client

d. intranet
15 18

5 out of 20

5. A(n) ____ modem usually is in the form of an adapter card that you insert in an expansion slot on a computer's motherboard. a. DSL b. ISDN c. dial-up d. cable
36 34

6 out of 20

6. A(n) ____ extends the basic home network to include features such as lighting control, thermostat adjustment, and a security system. a. intelligent home network b. wireless home network c. phoneline network d. powerline cable network
40 42

7 out of 20

7. A form of broadcast radio that is used widely for mobile communications is called ____. a. infrared b. microwave c. cellular radio d. communications satellite
49 47

8 out of 20

8. A collection of computers and devices connected together via communications devices and transmission media is called a(n) ____. a. workgroup b. online meeting c. cybercafe d. network
8 11

9 out of 20

9. With ____, the data transfers between devices at a rate of up to 3 Mbps. a. TCP/IP b. Bluetooth c. Ethernet d. 802.11
26 24

10 out of 20

10. Users who do not have other high-speed Internet access in their area can opt for ____. a. FTP b. fractional T1 c. WAP d. dial-up
34 32

11 out of 20

11. On a ____, all of the computers and devices (nodes) on the network connect to a central device. a. ring network b. bus network c. star network

d. bus ring network


21 22

12 out of 20

12. For successful communications, you need a(n) ____ that connects the communications channel to a receiving device. a. communications device b. analog signal c. sending device d. digital signal
2 3

13 out of 20

13. A computer in a voice mail system converts an analog voice message into ____ form. a. radio b. digital c. packet d. chat
7 9

14 out of 20

14. A(n) ____ is as thin as a human hair. a. coaxial cable b. twisted-pair cable c. optical fiber d. broadband cable
47 45

15 out of 20

15. The design of computers, devices, and media in a network is sometimes called the ____. a. network architecture b. network dictionary c. network router d. network map
13 16

16 out of 20

16. A(n) ____ consists of individual electrical pulses that represent bits grouped into bytes. a. analog signal b. digital signal c. communications channel d. transmission medium
35 2

17 out of 20

17. XML is used in ____, which is used to distribute content, such as news, to subscribers. a. Electronic Data Interchange (EDI) b. RSS c. EFT d. value-added network (VAN)
10 12

18 out of 20

18. Coaxial cable is often referred to as ____. a. twisted-pair b. fiber optic c. 10Base-T d. coax

46

44

19 out of 20

19. ____ describes an Internet network on which users access each other's hard disks. a. Intranet b. TCP/IP c. P2P d. Client/server
18 21

20 out of 20

20. Walls, ceilings, and electrical devices such as cordless telephones and microwave ovens can disrupt ____ network communications. a. Ethernet b. token ring c. TCP/IP d. wireless
44
1 out of 20

41

1. A(n) ____ is as thin as a human hair. a. coaxial cable b. twisted-pair cable c. optical fiber d. broadband cable
47 45

2 out of 20

2. ____ networks are fairly easy to configure. a. Wi-Fi b. Bluetooth c. token ring d. TCP/IP
43 51

3 out of 20

3. ____ supports faster transfer rates when receiving data than when sending data. a. ADSL b. DSL c. ISDN d. Dial-up
33 54

4 out of 20

4. A(n) ____ modem usually is in the form of an adapter card that you insert in an expansion slot on a computer's motherboard. a. DSL b. ISDN c. dial-up d. cable
36 34

5 out of 20

5. On a ____, a cable forms a closed loop with all computers and devices arranged along the loop. a. ring network b. bus network c. star network d. bus ring network

22

52

6 out of 20

6. Two types of wireless Internet access points are ____ and mobile wireless networks. a. SMS b. Web services c. hot spots d. TCP/IP
4 8

7 out of 20

7. ____ describes an Internet network on which users access each other's hard disks. a. Intranet b. TCP/IP c. P2P d. Client/server
18 21

8 out of 20

8. ____ allows users connected to a network to transfer money from one bank account to another via transmission media. a. Electronic Data Interchange (EDI) b. Voice mail c. Ethernet d. Electronic funds transfer (EFT)
11 13

9 out of 20

9. ____ is a type of application software used for communications. a. FTP software b. Word processing software c. Database software d. Image editing software
29 28

10 out of 20

10. Devices equipped with ____ ports transfer data at rates from 115 Kbps (thousand bits per second) to 4 Mbps between their ports. a. Bluetooth b. IrDA c. TCP/IP d. Ethernet
27 27

11 out of 20

11. Using a ____ line to connect computers costs no more than making a regular telephone call. a. dial-up b. DSL c. CATV d. T-carrier
30 29

12 out of 20

12. Users who do not have other high-speed Internet access in their area can opt for ____. a. FTP b. fractional T1 c. WAP d. dial-up

34

32

13 out of 20

13. Simple ____ applications include electronic publishing of organizational materials such as telephone directories, event calendars, procedure manuals, employee benefits information, and job postings. a. ring network b. extranet c. star network d. intranet
23 53

14 out of 20

14. To prevent unauthorized users from accessing files and computers, many routers are protected by a built-in ____. a. hub b. bridge c. switch d. firewall
39 36

15 out of 20

15. A(n) ____ is a wireless network that provides Internet connections to mobile computers and other devices. a. hot spot b. online meeting c. global positioning system (GPS) d. cybercafe
5 10

16 out of 20

16. Examples of networking software that support ____ are BitTorrent, Gnutella, Kazaa, and LimeWire, which allow users to swap music and other files via the Web. a. client/server networking b. P2P c. peer-to-peer networking d. intelligent home networking
19 50

17 out of 20

17. For successful communications, you need a(n) ____ that connects the communications channel to a receiving device. a. communications device b. analog signal c. sending device d. digital signal
2 3

18 out of 20

18. Most home networks use a ____ network, which sends signals through the air at distances of up to 1,500 feet in some configurations. a. Wi-Fi b. Bluetooth c. token ring d. TCP/IP
42 39

19 out of 20

19. A central communications device that allows computers and devices to transfer data wirelessly among themselves is called a ____. a. network interface card b. wireless access point c. digital modem

d. router
38 35

20 out of 20

20. A print server is an example of a(n) ____. a. Ethernet b. dedicated server c. client d. intranet
15 18

Chapter 10: Database Management


1 out of 20

1. A Web database usually resides on a ____. a. backbone b. database client c. database server d. tuple
46 36

2 out of 20

2. ____ information should give more value than it costs to produce. a. Cost-effective b. Useful c. Verifiable d. Timely
8 42

3 out of 20

3. A(n) ____ is a copy of a record after changes have been made to it. a. rollforward b. before image c. after image d. rollback
36 26

4 out of 20

4. The ____ data is characterized by lengthy text entries. a. currency b. memo c. hyperlink d. text
14 44

5 out of 20

5. ____ is a popular query language that allows users to manage, update, and retrieve data. a. Sybase b. SQL c. DB2 d. D3
40 30

6 out of 20

6. The role of coordinating the use of the database belongs to the database ____ and administrators. a. designers b. users c. owners d. analysts
47 37

7 out of 20

7. ____ procedures include adding records to, modifying records in, and deleting records from a file. a. Data hierarchy b. File maintenance c. File Validation d. Data normalization
17 13

8 out of 20

8. Processed data is called ____. a. software b. input c. information d. communications


1 3

9 out of 20

9. A program that generally has a more user-friendly interface than a DBMS is called a ____. a. front end b. repository c. back end d. form
27 20

10 out of 20

10. Each field is uniquely identified by a ____. a. data type b. key field c. field name

d. data file
10 43

11 out of 20

11. A data dictionary is sometimes called a ____. a. repository b. data mine c. data warehouse d. report generator
29 48

12 out of 20

12. A ____ analyzes entered data to help ensure that it is correct. a. file processing system b. database approach c. validity check d. data dictionary
18 14

13 out of 20

13. A ____ contains text, graphics, video, and sound. a. hypermedia database b. multimedia database c. Web database d. groupware database
42 32

14 out of 20

14. ____ data is also called alphanumeric data. a. Text

b. Currency c. Memo d. Object


12 9

15 out of 20

15. ____ information has an age suited to its use. a. Continuous b. Timely c. Extemporaneous d. Sequential
5 1

16 out of 20

16. A(n) ____ check ensures that users enter only numeric data into a field. a. alphanumeric b. consistency c. range d. numeric
22 47

17 out of 20

17. The field that uniquely identifies each record in a file is called a ____. a. composite key b. check digit c. primary key d. validity check
16 10

18 out of 20

18. An item that contains data, as well as the actions that read or process the data, is called a(n) ____. a. query b. hypercube c. object d. CGI script
41 31

19 out of 20

19. Validity checks are also called ____. a. queries b. validation rules c. relations d. data models
20 45

20 out of 20

20. ____ for data involve establishing who can enter new data, modify existing data, delete unwanted data, and view data. a. Access privileges b. Entry privileges c. Write privileges d. Editing privileges
35 25

1. ____ is a popular query language that allows users to manage, update, and retrieve data. a. Sybase b. SQL c. DB2 d. D3
40 30

2 out of 20

2. ____ reduce data entry errors and thus enhance the data's integrity. a. Validity checks b. Checksums c. Cyclic tests d. Redundancy checks
21 15

3 out of 20

3. Processed data is called ____. a. software b. input c. information d. communications


1 3

4 out of 20

4. Access, manufactured by the Microsoft Corporation, exists in versions for ____. a. personal computer, server, mainframe, mobile devices b. personal computer, server, mainframe c. personal computer, server, mobile devices d. server, mainframe
28 49

5 out of 20

5. For a computer to produce correct information, the data that is entered into a database must have ____. a. normalization

b. integrity c. information d. profits


3 6

6 out of 20

6. ____ data is also called Boolean data. a. AutoNumber b. Yes/No c. Hyperlink d. Numeric
15 11

7 out of 20

7. A program that generally has a more user-friendly interface than a DBMS is called a ____. a. front end b. repository c. back end d. form
27 20

8 out of 20

8. The ____ creates and maintains the data dictionary. a. database analyst b. data modeler c. database administrator d. data processor
49 39

9 out of 20

9. A Web database usually resides on a ____. a. backbone b. database client c. database server d. tuple
46 36

10 out of 20

10. Validity checks are also called ____. a. queries b. validation rules c. relations d. data models
20 45

11 out of 20

11. Data warehouses often use a process called ____ to find patterns and relationships among data. a. data mining b. normalization c. query by example (QBE) d. data modeling
45 35

12 out of 20

12. A(n) ____ stores data in dimensions. a. object-oriented database b. relational database c. object-relational database d. multidimensional database
43 33

13 out of 20

13. A ____ contains text, graphics, video, and sound. a. hypermedia database b. multimedia database c. Web database d. groupware database
42 32

14 out of 20

14. A ____ analyzes entered data to help ensure that it is correct. a. file processing system b. database approach c. validity check d. data dictionary
18 14

15 out of 20

15. A request for specific data from the database is called a ____. a. form b. query c. log d. before image
32 50

16 out of 20

16. ____ information is arranged to suit the needs and requirements of the decision maker. a. Organized b. Verifiable c. Timely

d. Useful
6 2

17 out of 20

17. A database uses a variety of characteristics, such as ____ and data type, to define each field. a. data size b. key frequency c. field frequency d. field size
11 8

18 out of 20

18. A number or character that is appended to or inserted in a primary key value is called a ____. a. data type b. key field c. primary key d. check digit
24 17

19 out of 20

19. The field that uniquely identifies each record in a file is called a ____. a. composite key b. check digit c. primary key d. validity check
16 10

20 out of 20

20. Each field is uniquely identified by a ____. a. data type b. key field c. field name d. data file
1 out of 20

1. The user of a relational database refers to a file as a(n) ____. a. table b. attribute c. column d. relation
39 29

2 out of 20

2. A Web database usually resides on a ____. a. backbone b. database client c. database server d. tuple
46 36

3 out of 20

3. A(n) ____ is a copy of a record after changes have been made to it. a. rollforward b. before image c. after image d. rollback
36 26

4 out of 20

4. ____ procedures include adding records to, modifying records in, and deleting records from a file. a. Data hierarchy b. File maintenance c. File Validation d. Data normalization
17 13

5 out of 20

5. Each field is uniquely identified by a ____. a. data type b. key field c. field name d. data file
10 43

6 out of 20

6. A database analyst (DA) is also called a ____. a. data modeler b. database administrator c. data manager d. data processor
48 38

7 out of 20

7. Processed data is called ____. a. software b. input c. information d. communications


1 3

8 out of 20

8. In a typical ____, each department or area within an organization has its own set of files. a. database approach b. file management system c. file processing system d. database model
25 18

9 out of 20

9. ____ is a computing phrase that points out the accuracy of a computer's output depends on the accuracy of the input. a. Rubbish in, rubbish out (RIRO) b. Garbage in, garbage out (GIGO) c. Nonsense in, nonsense out (NINO) d. Junk in, junk out (JIJO)
4 4

10 out of 20

10. ____ is a popular query language that allows users to manage, update, and retrieve data. a. Sybase b. SQL c. DB2 d. D3
40 30

11 out of 20

11. ____ is a common data type. a. Object-oriented b. Relational

c. Normalized d. Date
13 12

12 out of 20

12. Access, manufactured by the Microsoft Corporation, exists in versions for ____. a. personal computer, server, mainframe, mobile devices b. personal computer, server, mainframe c. personal computer, server, mobile devices d. server, mainframe
28 49

13 out of 20

13. The field that uniquely identifies each record in a file is called a ____. a. composite key b. check digit c. primary key d. validity check
16 10

14 out of 20

14. ____ data is also called Boolean data. a. AutoNumber b. Yes/No c. Hyperlink d. Numeric
15 11

15 out of 20

15. If the data fails a ____, the computer either should not allow the invalid data to be entered, or it should display an error message that instructs the user to enter the data again. a. key test b. validity check c. cyclic test d. date check
19 46

16 out of 20

16. The role of coordinating the use of the database belongs to the database ____ and administrators. a. designers b. users c. owners d. analysts
47 37

17 out of 20

17. In ____ companies, one person often is both the DA and DBA. a. most b. mid-sized c. nearly all d. small
50 40

18 out of 20

18. You use ____ to retrieve and maintain the data in a database. a. report writers b. forms c. backups d. data models

34

24

19 out of 20

19. The ____ creates and maintains the data dictionary. a. database analyst b. data modeler c. database administrator d. data processor
49 39

20 out of 20

20. ____ reduce data entry errors and thus enhance the data's integrity. a. Validity checks b. Checksums c. Cyclic tests d. Redundancy checks

Anda mungkin juga menyukai