Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

10 muti chooice

Question 1
  1.  Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n):

    Answer

     uniform resource locator third-level domain IP address root domain 

    2 points  

    Question 2
    1.  Which digital cellular standard is used widely throughout the world except the United States?

      Answer

       GSM LTD WLAN CDMA 

      2 points  

      Question 3
      1.  A network that covers entire geographical regions is most commonly referred to as a(n):

        Answer

         local area network peer-to-peer network wide area network intranet 

        2 points  

        Question 4
        1.  In a telecommunications network architecture, a protocol is:

          Answer

           a communications service for microcomputer users a standard set of rules and procedures for control of communications in a network the main computer in a telecommunications network a device that handles the switching of voice and data in a local area network 

          2 points  

          Question 5
          1.  Web browser software requests webpages from the internet using which protocol?

            Answer

             HTML  URL  HTTP  DNS  

            2 points  

            Question 6
            1.  ________ integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience.

              Answer

               Virtual private networks Intranets Unified communications Wireless networks 

              2 points  

              Question 7
              1.  Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server?

                Answer

                 wireless  LAN  Windows domain network  peer-to-peer  

                2 points  

                Question 8
                1.  Which process is used to protect transmitted data in a VPN?

                  Answer

                   PPP packet-switching tunneling VOIP 

                  2 points  

                  Question 9
                  1.  Which of the following services enables logging on to one computer system and working on another?

                    Answer

                     telnet newsgroups FTP World Wide Web 

                    2 points  

                    Question 10
                    1.  Based on your reading of the examples in the chapter, what would be the best use of RFID for a business?

                      Answer

                       managing the supply chain enabling client communication logging transactions lowering network costs 

                      2 points  

                       Save and Submit

                      Click Save and Submit to save and submit. Click Save All Answers to save all answers.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question