Create an account
in a telecommunications network architecture, a protocol is
a standard set of rules and procedures for control of communications in a network
bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio based communication
which of the following services enables logging on to one computer system and working on another?
what are the four layers of the TCP/IP reference model?
application, transport, internet, and network interface
the total amount of digital information that can be transmitted through any telecommunications medium is measured in:
the method of slicing digital messages into parcels, transmitting them along different communications paths, and reassembling them at their destinations is called
which type of network treats all processors equally, and allows peripheral devices to be shared without going to a separate server?
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as
Together, a protocol prefix, a domain name, a directory, and a document name, are called a
uniform resource locator
the process of employing techniques to help a web site achieve a higher ranking with the major search engines is called
which of the following is not a characteristic of packet switching
packet switching requires point-to-point circuits
_______ works by using radio waves to communicate with radio antennas placed within adjacent geographic
Which of the following statements is not true about search engines
there are hundreds of search engines vying for user attention, with no clear leader having yet emerged
Bandwidth is the:
difference between the highest and lowest frequencies that can be accommodated on a single channel
the device that acts as a connection point between computers and can filter and forward data to a specified destination is called a
what technology allows people to have content pulled from web sites and fed automatically to their computers
based on your reading of the examples in the chapter, what would be the best use of RFID for a business?
which type of network is used to connect digital devices within a half-mile or 500-meter radius?
which of the following is the first generation of cellular systems suitable for wireless broadband internet access?
the internet is based on which three key technologies?
client/server computing, packet switching, and the development of communications standards for linking networks and computers
the need in some cases for empoyees to have access to sexually explicit material on the internet, such as medical researchers, suggests that companies
need to base their internet use policies on the needs of the organization and culture
_______ integrate(s) disparate channels for voice communications, data communications, instant ,messaging, e-mail, and electronic conferencing into a single experience
which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents?
in the domain name "http://myspace.blogging.com", what are the root, top-level, second-level, and third-level domains, respectively?
".",com, blogging, myspace
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together