Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Which of the following include the three primary network access technologies? A.

ID: 339380 • Letter: W

Question

Which of the following include the three primary network access technologies?

A. DSL, Cable Modem, Broadband

B. LAN, WAN, MAN

C. VoIP, UC, IPTV

D. TCP/IP, FTP, DHCP

What are the five elements that are needed to create a connected world or a network?

A. categories, programs, alternatives, people, and core philosophy

B. program, providers, access, mechanics, and teachers

C. categories, providers, access technologies, protocols, and convergence

D. LAN, WAN, MAN, PAN, and SAN

What is a large computer network usually spanning a city or a specific infrastructure like a

college?

A. metropolitan area network (MAN)

B. local area network (LAN)

C. wide area network (WAN)

D. secure area network (SAN)

LANs, WANs, and MANs all provide users with an accessible and reliable network

infrastructure. Which of the below are the most important network differentiating dimensions?

A. reliability and timing

B. confidentiality and performance

C. security and cost

D. cost and performance

The Internet is a hierarchical structure linking different levels of service providers whose

millions of devices supply all the interconnections. The three levels outlined in the book from the

top down include ________.

A. new system provider (NSP), current system provider (CSP), and order entry system provider

(OSP)

B. national service provider (NSP), regional service provider (RSP), and internet service

provider (ISP)

C. net server point (NSP), radio server point (RSP), and internet server point (ISP)

D. None of these are correct.

The speed of transmission of a network is determined by the speed of its smallest ________.

A. unit of time

B. number of computers

C. amount of bandwidth

D. number of customers

What measures bandwidth in terms of numbers transferred or received per unit of time?

A. connection time

B. broadband

C. protocol

D. bit rate

What are the two most prevalent types of broadband access?

A. data subscriber and cable connection

B. digital subscriber line and cable connection

C. digital line and client line

D. digital server and client server

What allows users to work from remote locations such as home or hotel using high-speed

Internet to access business applications and data?

A. telecommuting

B. repeater

C. packet header

D. virtual attenuation

What is traceroute?

A. a single unit of binary data routed through a network

B. lists the destination (for example, in IP packets the destination is the IP address) along with

the length of the message data

C. represents the end of the packet or transmission end

D. a utility application that monitors the network path of packet data sent to a remote computer

What lists the destination (for example in IP packets the destination is the IP address) along with

the length of the message data?

A. traceroute

B. standard packet

C. packet header

D. packet footer

What is a utility application that monitors the network path of packet data sent to a remote

computer?

A. traceroute

B. standard packet

C. packet header

D. packet footer

What is the standard Internet protocol, which provides the technical foundation for the public

Internet?

A. data streaming and DSL protocols

B. transmission control protocol/Internet protocol (TCP/IP)

C. data streaming rules and regulations

D. Internet protocol/Transmission control protocol (IP/TCP)

How do TCP and IP differ?

A. TCP verifies the correct delivery of data in case it is corrupted, where IP verifies the data are

sent to the correct IP address.

B. TCP verifies the information is reliable, and IP verifies that the data is sent.

C. IP verifies the correct delivery of data in case it is corrupted, where TCP verifies the data are

sent to the correct IP address.

D. IP verifies connectivity, and TCP verifies the rate at which the data is sent.

What is the conversion of IP addresses that identifies labels that use a variety of recognizable

naming conventions?

A. domain grades

B. URL spaces

C. domain national sequences (DNS)

D. domain name system (DNS)

What is a benefit of network convergence?

A. the uncoupling of voice, data, and video service

B. multiple services offered from several different vendors

C. multiple devices supported by one provider

D. All of these are correct.

What is the biggest benefit of VoIP?

A. lowers costs

B. clear connection

C. higher expenses

D. All of these are correct.

What is an extension of an intranet that is available only to authorized outsiders?

A. national ISP

B. regional ISP

C. intranet

D. extranet

What is the major challenge of networking or performing business in a connected world?

A. personal issues

B. society demands

C. security issues

D. telecommuting demands

Which of the statements below is not accurate in reference to mobile and wireless computing?

A. Mobile technology can travel with the user.

B. Wireless technology is any type of operation accomplished without the use of a hard-wired

connection.

C. Wireless technology is any type of operation accomplished with the use of a hard-wired

connection.

D. Mobile technology allows a user to download software to a laptop or cell phone for portable

reading or reference.

A wireless WAN (WWAN) is a wide area network that uses radio signals to transmit and receive

data and can be divided into which two categories?

A. cellular communications and multiple user communication systems

B. mobile and wireless technologies

C. cellular and satellite communication systems

D. client and server systems

What is mobile device management (MDM)?

A. allows mobile voice calls to be made over broadband networks, creating—under the right

network conditions—clearer audio and fewer dropped calls

B. remotely controls smart phones and tablets, ensuring data security

C. the blending of personal and business use of technology devices and applications

D. administers and delivers applications to corporate and personal smart phones and tablets

Which of the following is not a primary use of GIS?

A. finding what is nearby from a specific location

B. mapping densities

C. routing information

D. ensuring safety equipment is on an airplane before a flight

What allows separate systems to communicate directly with each other, eliminating the need for

manual entry into multiple systems?

A. integration

B. intelligence

C. data interchange

D. demand plan

What is the integration of data from multiple sources, which provides a unified view of all data?

A. backward integration

B. application integration

C. data integration

D. forward integration

What provides enterprisewide support and data access for a firm’s operations and business

processes?

A. enterprise systems

B. enterprise application integration

C. middleware

D. enterprise application integration middleware

What connects the plans, methods, and tools aimed at integrating separate enterprise systems?

A. enterprise systems

B. enterprise application integration

C. middleware

D. enterprise application integration middleware

What are several different types of software that sit between and provide connectivity for two or

more software applications?

A. enterprise systems

B. enterprise application integration

C. middleware

D. enterprise application integration middleware

In which of the five basic supply chain activities do you prepare to manage all resources required

to meet demand?

A. plan

B. source

C. deliver

D. return

In which of the five basic supply chain activities do you plan for the transportation of goods to

customers?

A. plan

B. source

C. deliver

D. return

Where would you find the suppliers' suppler in a typical supply chain?

A. upstream

B. downstream

C. in the middle

D. not on the supply chain

Where would you find the manufacturer and distributor in a typical supply chain?

A. upstream

B. downstream

C. in the middle

D. not on the supply chain

Which of the following is not one of the five basic components of supply chain management?

A. plan

B. source

C. analyze

D. deliver

What can effective and efficient supply chain management systems enable an organization to

accomplish?

A. increase the power of its buyers

B. increase its supplier power

C. increase switching costs to increase the threat of substitute products or services

D. All of these are correct.

Which of the metrics below represents the agreed upon time between the purchase of a product

and the delivery of the product?

A. back order

B. inventory cycle time

C. customer order cycle time

D. inventory turnover

What is the purchasing of goods and services to meet the needs of the supply chain?

A. procurement

B. logistics

C. materials management

D. bullwhip effect

What includes the increasingly complex management of processes, information, and

communication to take a product from cradle to grave?

A. inbound logistics

B. outbound logistics

C. logistics

D. cradle to grave

What are systems are used to create the digital designs and then manufacture the products?

A. computer-aided design/computer-aided manufacturing.

B. maker movement

C. makerspace

D. RFID electronic product code

What is a community center that provides technology, manufacturing equipment, and

educational opportunities to the public that would otherwise be inaccessible or unaffordable?

A. computer-aided design/computer-aided manufacturing

B. maker movement

C. makerspace

D. RFID electronic product code

Which of the following is not a current CRM trend?

A. partner relationship management

B. supplier relationship management

C. employee relationship management

D. distributor relationship management

Which of the following is not a valid way that a CRM system can collect information?

A. accounting system

B. order fulfillment system

C. inventory system

D. customer’s personal computer

Which of the following is a common marketing CRM metric?

A. number of new prospective customers

B. average number of service calls per day

C. average time to resolution

D. cost per interaction by marketing campaign

Which question below represents a CRM reporting technology example?

A. Why did sales not meet forecasts?

B. What customers are at risk of leaving?

C. What is the total revenue by customer?

D. All of these are correct.

Which question below represents a CRM predicting technology question?

A. Why did sales not meet forecasts?

B. What customers are at risk of leaving?

C. What is the total revenue by customer?

D. All of these are correct.

Which of the following is not considered a feature in a contact center?

A. automatic call distribution

B. interactive voice response

C. predictive dialing

D. automatic predictive dialing

Which of the following is where customer service representatives answer customer inquiries and

respond to problems through a number of different customer touchpoints?

A. contact center

B. web-based self-service

C. call scripting

D. website personalization

What is the primary difference between contact management and opportunity management?

A. Contact management deals with new customers; opportunity management deals with existing

customers.

B. Contact management deals with existing customers; opportunity management deals with

existing customers.

C. Contact management deals with new customers; opportunity management deals with new

customers.

D. Contact management deals with existing customers; opportunity management deals with new

customers.

Which of the following occurs when everyone involved in sourcing, producing, and delivering

the company’s product works with the same information?

A. eliminates redundancies

B. cuts down wasted time

C. removes misinformation

D. All of these are correct.

Which of the following describes an ERP system?

A. ERP systems provide a foundation for collaboration between departments.

B. ERP systems enable people in different business areas to communicate.

C. ERP systems have been widely adopted in large organizations to store critical knowledge used

to make the decisions that drive the organization’s performance.

D. All of these are correct.

Which of the following is a business-related consequence of successful software?

A. increased revenues

B. damage to brand reputation

C. increased liabilities

D. increased expenses

Which of the following represents the phases in the SDLC?

A. plan, analysis, design, test, maintain, develop, implement

B. analysis, plan, design, test, develop, maintain, implement

C. plan, analysis, design, develop, test, implement, maintain

D. analysis, plan, develop, design, test, implement, maintain

What is a project manager?

A. the application of knowledge, skills, tools, and techniques to project activities in order to meet

or exceed stakeholder needs and expectations from a project

B. any measurable, tangible, verifiable outcome, result, or item that is produced to complete a

project or part of a project

C. the representation of key dates when a certain group of activities must be performed

D. an individual who is an expert in project planning and management

Which of the following does a project manager perform?

A. defines and develops the project plan

B. tracks the plan to ensure all key project milestones are completed on time

C. expert in project planning and management

D. All of these are correct.

Which phase of the SDLC gathers business requirements?

A. plan

B. analysis

C. test

D. design

What is a data flow diagram (DFD)?

A. an illustration of the movement of information between external entities and the processes and

data stores within the system

B. software suites that automate systems analysis, design, and development

C. a formal, approved document that manages and controls the entire project

D. a graphical representation of the processes that capture, manipulate, store, and distribute

information between a system and its environment

Which phase takes all the detailed design documents from the design phase and transforms them

into the actual system?

A. testing phase

B. analysis phase

C. development phase

D. planning phase

What are defects in the code of an information system?

A. testing

B. bugs

C. insects

D. All of these are correct.

What assesses if the entire system meets the design requirements of the users?

A. alpha testing

B. development testing

C. integration testing

D. system testing

What verifies that separate systems can work together passing data back and forth correctly?

A. alpha testing

B. development testing

C. integration testing

D. system testing

What is the implementation phase in the SDLC?

A. Involves establishing a high-level plan of the intended project and determining project goals.

B. Involves analyzing end-user business requirements and refining project goals into defined

functions and operations of the intended system.

C. Involves describing the desired features and operations of the system.

D. Involves placing the system into production so users can begin to perform actual business

operations with the system.

What makes system changes to repair design flaws, coding errors, or implementation issues?

A. corrective maintenance

B. preventative maintenance

C. pilot implementation

D. phased implementation

What is an activity-based process in which each phase in the SDLC is performed sequentially

from planning through implementation and maintenance?

A. RAD methodology

B. agile methodology

C. waterfall methodology

D. extreme programming

Which of the following is an issue related to the waterfall methodology?

A. flaws in accurately defining and articulating the business problem

B. managing costs, resources, and time constraints

C. assumes users can specify all business requirements in advance

D. All of these are correct.

What breaks a project into tiny phases, and developers cannot continue on to the next phase until

the first phase is complete?

A. RAD methodology

B. agile methodology

C. waterfall methodology

D. extreme programming

Which gate in the RUP methodology expands on the agreed-upon details of the system,

including the ability to provide an architecture to support and build it?

A. inception

B. elaboration

C. construction

D. transition

Which gate in the RUP methodology includes building and developing the project?

A. inception

B. elaboration

C. construction

D. transition

Which methodology begins or ends each day with a stand-up meeting to monitor and control the

development effort?

A. Scrum

B. XP

C. RUP

D. RAD

What measures how well the solution will be accepted in a given opportunity?

A. political feasibility

B. operational feasibility

C. schedule feasibility

D. legal feasibility

What is the number one reason that IT projects fall behind schedule or fail?

A. change in business goals during the project

B. lack of support from business management

C. unclear or missing business requirements

D. change in technology during the project

What defines the how, what, when, and who regarding the flow of project information to

stakeholders and is key for managing expectations?

A. communication plan

B. executive sponsor

C. project assumptions

D. project deliverable

Which of the following is not a characteristic of a well-defined project plan?

A. prepared by the project manager

B. easy to read

C. appropriate to the project’s size

D. communicated to all key participants

What is the most important part of the project plan?

A. Gantt chart

B. specification

C. communication

D. None of these are correct.

What type of chart typically displays the critical path?

A. Gantt chart

B. PERT chart

C. All of these are correct.

D. None of these are correct.

Which of the following is the primary reason why companies outsource?

A. tap outside sources of expertise for a low cost

B. concentrate resources on core business

C. reduce headcount and related expenses

D. better manage the costs of internal processes

Which of the following is the least common reason why companies outsource?

A. tap outside sources of expertise for a low cost

B. concentrate resources on core business

C. reduce headcount and related expenses

D. better manage the costs of internal processes

Explanation / Answer

Q1) the three primary network access technologies are:

a) DSL, Cable Modem, broadband

Q2) the five elements that are needed to create a connected world or a network are:

c) categories, providers, access technologies, protocols, and convergence

Q3) large computer network usually spanning a city or a specific infrastructure like a college is:

a) Metropolitan Area network

Q4) the most important network differentiating dimensions:

d) Cost and performance

Q5) The Internet is a hierarchical structure linking different levels of service providers whose millions of devices supply all the interconnections. The three levels outlined in the book from the top down include:

b) national service provider (NSP), regional service provider (RSP), and internet service provider (ISP)

Q6) The speed of transmission of a network is determined by the speed of its smallest:

c) Amount of Bandwidth

Q7) what measures bandwidth in terms of numbers transferred or received per unit of time:

d) Bit rate

Q8) What are the two most prevalent types of broadband access:

b) digital subscriber line and cable connection

Q9) What allows users to work from remote locations such as home or hotel using high-speed Internet to access business applications and data:

a) Telecommuting

Q10) What is traceroute?:

d) a utility application that monitors the network path of packet data sent to a remote computer

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote