Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

A large hotel chain wants to conduct targeted marketing promotions using zip cod

ID: 3855507 • Letter: A

Question

A large hotel chain wants to conduct targeted marketing promotions using zip code data it collects from its guests when they chock in When the company analyzes the zip code data, they discover that many of the zip codes are 99999. This occurred because the clerks were not asking customers for their zip codes, but they would enter something to complete the registration process. This is an example of unacceptable a. data storage b. data integration c. metadata d. data quality e. source systems The transmission capacity of a network measured in bits per second, is called its a. NetCap b. protocol c bandwidth d. broadband e. narrowband If you were to connect two or more devices within the same building so that every device on the network could communicate with every other device, you would typically use a a. backbone network b. local-area network c. wide-area network d. personal-area network e. metropolitan-area network If you were to connect multiple local are World Wide Web model networks using a common carrier such as AT&T;, you would typically use a a backbone network b. local-area network c. wide-area network d. personal-area network e. metropolitan-area network Corporate _____ are high-speed central networks to which multiple smaller networks connect. a. backbone networks b. local-area networks c. wide-area networks d. personal-area networks e. metropolitan-area networks _____ is typically used as the backbone for network, whereas _____ connects the backbone to individual devices on the network. a. Twisted-pair wire, fiber-optic cable b. Coaxial cable, fiber-optic cable c. Twisted-pair wire, coaxial cable d. Fiber-optic cable, twisted-pair wire e. Wi-Fi, fiber-optic cable The nodes in a network work together by adhering to a common set of rules and procedures, known as a(n) _____ a. TCP/IP b. protocol c. Wi-Fi d. WWW e. HTTP The Internet would not be possible without the data communication protocol called a. EDI b. HTTP c. TCP/IP d. URL e. WWW Breaking up a message into small components transmitting each component along a different route, and assembling the pieces at destination known as the a. client-server model/architecture b. Internet model c. TCP/IP model d. packet-switching model e. World Wide Web model One computer requesting a file from another computer, and the second computer transmit that file, is known as the a. client-server model/architecture b. Internet model c. TCP/IP model d. packet-switching model e. World Wide Web model In the _____ model, each computes access all the files on all the other computer a packet-switching d. intranet e. extranet

Explanation / Answer

28. bandwidth

It is known as the dats that transmitted in a fixed amount of time and it can be expressed as bites per second or bytes per second.


29. LAN
A local area network (LAN) is a computer network that interconnects systems within a limited area such as a buildings, school.


30. WAN
The system of LANs known as WAN. It consists of two or more local-area networks.

31. Backbone networks
In networking, a backbone is to transfer network traffic at high speeds using high-performance routers.


32. Fiber-optic cable, twisted-pair wire
fiber optic cabling is used for the backbone and twisted pair wire is used to connect the backbone to individual devices.


33. Protocol
This set of rules and procedures that govern transmission across a network is a protocol.


34. TCP/IP

Transmission Control Protocol/Internet Protocol (TCP/IP)

The system uses the TCP?IP protocol as a language to access the internet.


35 packet switching model

Breaking up a message into small components transmitting each component along a different route and assembling the pieces at destination known as packet switching model


36.client server

In this model the server system delivers the resources and services to the client system. The client act as a consumer and the server acts as a server.

37 . peer - to -peer

In this model every computer access services from all other services. There is no one particular server system to deliver the services.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote