Infrared
As discussed earlier in the chapter, infrared (IR) is a wireless transmission medium that sends signals using infrared light waves. Mobile computers and devices, such as a mouse, printer, and smart phone, often have an IrDA port that enables the transfer of data from one device to another using infrared light waves.
Broadcast Radio
Broadcast radio is a wireless transmission medium that distributes radio signals through the air over long distances such as between cities, regions, and countries and short distances such as within an office or home. Bluetooth, UWB, Wi-Fi, and WiMAX communications technologies discussed earlier in this chapter use broadcast radio signals.
Cellular Radio
Cellular radio is a form of broadcast radio that is used widely for mobile communications, specifically wireless modems and cell phones. A cell phone is a telephone device that uses high-frequency radio waves to transmit voice and digital data messages.
Some mobile users connect their notebook computer or other mobile computer to a cell phone to access the Web, send and receive e-mail, enter a chat room, or connect to an office or school network while away from a standard telephone line. Read Looking Ahead 8-2 for a look at the next generation of cellular communications.
BIS 221 Week 5 Apply Assignment
Question text
Application software is the software that is used when you do each of the following tasks except
Select one:
a. start your computer.
b. create art.
c. send an email.
d. surf the web.
Question text
WordStar was an early _____ application for personal computers.
Select one:
a. graphics editing
b. desktop publishing
c. spreadsheet
d. word processor
Question text
In the past, mobile applications were typically not as full-featured as their non-mobile counterparts because of the limitations of
Select one:
a. processing speed and graphics capabilities.
b. screen size and keyboard functionality.
c. storage capacity and processing speed.
d. memory and screen size.
Question text
Productivity software suites typically include each of the following except _____ software.
Select one:
a. spreadsheet
b. presentation
c. word processor
d. financial management
Question text
As discussed in Chapter 5, a key benefit of a software suite is
Select one:
a. All of the choices are correct.
b. a common interface among programs.
c. free upgrades to new versions.
d. access to cloud storage and cloud-based versions of the software.
Question text
Office 365 is an example of
Select one:
a. CAD/CAM.
b. SaaS.
c. SCM.
d. ERP.
Question text
If you create a(n) _____ object, when the source is updated, the object is also updated.
Select one:
a. embedded
b. connected
c. formatted
d. linked
Question text
A computer network consists of two or more computing or other devices connected by a
Select one:
a. wireless signal.
b. wire.
c. cable.
d. communications medium.
Question text
The internet is a global network of
Select one:
a. microwave towers.
b. many networks linked together.
c. intranets.
d. social networks.
Question text
An analog signal is formed by _____ that _____.
Select one:
a. a discrete signal; is either high or low
b. a discrete signal; fluctuates between high and low
c. continuous sound waves; fluctuate between high and low
d. continuous sound waves; are either high or low
Question text
On a computer network, the term _____ refers to the number of bits per second that can be transmitted over a communications medium.
Select one:
a. frequency
b. latency
c. broadband
d. bandwidth
Question text
A microwave is a(n) _____ that is directed from one microwave station tower to another.
Select one:
a. beam of light
b. infrared light signal
c. low-frequency radio signal
d. high-frequency radio signal
Question text
Bluetooth is a network protocol that offers _____ connectivity via _____.
Select one:
a. short-range; infrared light signals
b. long-range; microwaves
c. short-range; radio waves
d. long-range; ultraviolet light signals
Question text
This wired networking standard specifies the order in which data is sent through the network.
Select one:
a. LTE
b. TCP/IP
c. WiMAX
d. Ethernet
Question text
If you connect to a network through your phone or cable company, then you probably connect through a
Select one:
a. MAN.
b. WAN.
c. WLAN.
d. LAN.
Question text
A _____ is a device that allows you to connect two or more networks in either a wired or wireless connection.
Select one:
a. router
b. hub
c. modem
d. switch
Question text
Which of the following is not described in Chapter 6 as a strategy to maintain network security?
Select one:
a. firewall
b. virtual private network (VPN)
c. bring your own device (BYOD) policy
d. computer-user policies
Question text
_____ computing is a solution for networks in which a reduction in time for data to travel across the network for processing is critical, such as in healthcare.
Select one:
a. 5G
b. Cloud
c. Offline
d. Edge
Question text
One of the benefits expected from 5G networks and devices includes
Select one:
a. Software as a Service.
b. edge computing capabilities.
c. Firewall as a Service.
d. speeds up to 50 times faster than 4G.
Question text
One predicted trend in social technology is the ability to do this with the profile you create when you join a service.
Select one:
a. alter it
b. update it automatically according to your life events
c. carry it from site to site
d. hide it
Question text
Because the _____ was already in use in several programming languages, in 2007 it was suggested that this symbol be used to organize topics on Twitter.
Select one:
a. pound symbol (#)
b. exclamation point (!)
c. dollar sign ($)
d. at symbol (@)
Question text
One of the latest trends in the social web is _____, a movement driven by mobile apps such as Snapchat.
Select one:
a. media sharing
b. disappearing media
c. contact lists
d. social marketing
Question text
What would you consider one of the key features of a wiki?
Select one:
a. the ability to collaborate
b. the ability to create a list of friends
c. the accuracy of content
d. the opportunity for social interaction
Question text
Many media sharing sites use _____, a technology that allows them to send the content over the Internet in live broadcasts.
Select one:
a. live media streaming
b. video blogging
c. metadata
d. disappearing media
Question text
An important part of computer security is _____, which involves minimizing the risk of loss or theft of data from within a network.
Select one:
a. data loss prevention
b. information security
c. social engineering
d. authentication
Question text
A(n) _____ is a highly targeted, sophisticated attack tailored to a specific organization, usually to gain access to sensitive information.
Select one:
a. DoS
b. DLP
c. APT
d. WPA
Question text
Spyware is sometimes used by legitimate websites to track your browsing habits in order to
Select one:
a. improve customer service.
b. offer you the best price on the products you’re shopping for.
c. comply with law enforcement investigations.
d. better target advertisements to you.
Question text
A fingerprint scanner is used as a method of
Select one:
a. authentication.
b. decryption.
c. GPS tracking.
d. encryption.
Question text
A DoS attack typically causes an internet site to
Select one:
a. redirect visitors to another site.
b. track the browsing history of visitors.
c. send spam emails.
d. become inefficient or crash.
Question text
A honeypot is used by companies to
Select one:
a. store valuable data.
b. identify weak spots in their network security.
c. monitor network traffic.
d. generate encryption keys.
Status NEW Posted 22 Oct 2020 06:10 PM My Price 10.00
BIS----------- 22-----------1 W-----------eek----------- 5 -----------App-----------ly -----------Ass-----------ign-----------men-----------t-----------
file 1603391062-BIS 221 Week 5 Apply Assignment.docx preview (823 words )
B-----------IS -----------221----------- We-----------ek -----------5 A-----------ppl-----------y A-----------ssi-----------gnm-----------ent----------- Q-----------ues-----------tio-----------n t-----------ext----------- A-----------ppl-----------ica-----------tio-----------n s-----------oft-----------war-----------e i-----------s t-----------he -----------sof-----------twa-----------re -----------tha-----------t i-----------s u-----------sed----------- wh-----------en -----------you----------- do----------- ea-----------ch -----------of -----------the----------- fo-----------llo-----------win-----------g t-----------ask-----------s -----------exc-----------ept----------- S-----------ele-----------ct -----------one-----------: -----------a. -----------sta-----------rt -----------you-----------r c-----------omp-----------ute-----------r. ----------- b.----------- cr-----------eat-----------e a-----------rt.----------- c-----------. s-----------end----------- an----------- em-----------ail-----------. -----------d. -----------sur-----------f t-----------he -----------web-----------. -----------Que-----------sti-----------on -----------tex-----------t -----------Wor-----------dSt-----------ar -----------was----------- an----------- ea-----------rly----------- __-----------___----------- ap-----------pli-----------cat-----------ion----------- fo-----------r p-----------ers-----------ona-----------l c-----------omp-----------ute-----------rs.----------- S-----------ele-----------ct -----------one-----------: -----------a. -----------gra-----------phi-----------cs -----------edi-----------tin-----------g -----------b. -----------des-----------kto-----------p p-----------ubl-----------ish-----------ing----------- c-----------. s-----------pre-----------ads-----------hee-----------t -----------d. -----------wor-----------d p-----------roc-----------ess-----------or ----------- Qu-----------est-----------ion----------- te-----------xt ----------- In----------- th-----------e
Not Rated(0)