You are on page 1of 24

Test Bank for MIS Essentials 3rd Edition Kroenke

0132970759 9780132970754
Download full test bank at:
https://testbankpack.com/p/test-bank-for-mis-essentials-3rd-
edition-kroenke-0132970759-9780132970754/

MIS Essentials, 3e (Kroenke)


Chapter 6: Data Communication and the Cloud

Multiple Choice

1) The distinguishing characteristic of a LAN is ________.


A) that it connects at multiple locations
B) that it connects at a single location
C) that it is a network of networks
D) that all lines need not reside at the same geographic location
Answer: B
Page Ref: 131
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 1
Learning Outcome: Describe the components of an information system (IS)

2) A ________ connects computers at different geographic locations.


A) LAN
B) WAN
C) VPN
D) SOHO LAN
Answer: B
Page Ref: 131
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 1
Learning Outcome: Describe the components of an information system (IS)

3) The computers in two separate company sites must be connected using a ________.
A) LAN
B) WAN
C) SOHO LAN
D) MAC
Answer: B
Page Ref: 131
Difficulty: Easy
AACSB: Use of Information Technology
1
Copyright © 2014 Pearson Education, Inc.
Study Question: Study Question 1
Learning Outcome: Describe the components of an information system (IS)

2
Copyright © 2014 Pearson Education, Inc.
4) A ________ is used to provide seamless flow of data across networks.
A) layered protocol
B) point-to-point protocol
C) switch
D) UTP
Answer: A
Page Ref: 131
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 1
Learning Outcome: Describe the components of an information system (IS)

5) A(n) ________ is a set of rules that two communicating devices follow.


A) domain
B) attribute
C) protocol
D) database
Answer: C
Page Ref: 131
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 1
Learning Outcome: Describe the components of an information system (IS)

6) A ________ is a special-purpose computer that receives and transmits wired traffic on the
LAN.
A) protocol
B) switch
C) domain
D) SOHO LAN
Answer: B
Page Ref: 132
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Describe the major types of computer hardware and software used by
companies

3
Copyright © 2014 Pearson Education, Inc.
7) Each device on the LAN has a hardware component called the ________ that connects the
device's circuitry to the cable.
A) UTP
B) switch
C) NIC
D) POP
Answer: C
Page Ref: 133
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Describe the major types of computer hardware and software used by
companies

8) In order for a printer or a laptop to connect to a wireless LAN, it must have a ________.
A) WNIC
B) UTP
C) POP
D) VPN
Answer: A
Page Ref: 133
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Describe the major types of computer hardware and software used by
companies

9) The IEEE 802.3 protocol standard is also known as ________.


A) TCP/IP
B) Ethernet
C) Bluetooth
D) HTTP
Answer: B
Page Ref: 133
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Describe the major types of computer hardware and software used by
companies

4
Copyright © 2014 Pearson Education, Inc.
10) The WNIC devices connect to a(n) ________, which is the component of the LAN device
that processes wireless traffic and communicates with the wired switch.
A) router
B) PSDN
C) optical fiber cable
D) access point
Answer: D
Page Ref: 133
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Describe the major types of computer hardware and software used by
companies

11) Which protocol standard used for wired LAN connections specifies hardware characteristics,
such as which wire carry which signals?
A) intranet
B) WiMax
C) Ethernet
D) EVDO
Answer: C
Page Ref: 133
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Describe the major types of computer hardware and software used by
companies

12) Which of the following statements about LAN protocols is true?


A) The access point uses both the 802.3 and 802.11 standards.
B) The IEEE 802.11 protocol is also called Ethernet.
C) The switch operates on the 802.11 standard.
D) WNICs operate on the 802.3 protocol and communicate with the switch.
Answer: A
Page Ref: 134
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Describe the major types of computer hardware and software used by
companies

5
Copyright © 2014 Pearson Education, Inc.
13) Devices such as wireless mice and keyboards use ________ to connect to the computer.
A) NIC
B) broadband
C) cable
D) Bluetooth
Answer: D
Page Ref: 134
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Describe the major types of computer hardware and software used by
companies

14) Which of the following protocols is commonly used by LAN?


A) IEEE 802.3
B) DSL
C) EVDO
D) WiMax
Answer: A
Page Ref: 134
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Describe the major types of computer hardware and software used by
companies

15) What is the protocol commonly used for wireless LAN?


A) IEEE 802.11n
B) EVDO
C) DSL
D) IEEE 802.3
Answer: A
Page Ref: 134
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Describe the major types of computer hardware and software used by
companies

6
Copyright © 2014 Pearson Education, Inc.
16) Which of the following is true of an ISP?
A) An ISP converts digital data in the user's computer to an analog signal.
B) An ISP facilitates a one-way information transfer process between the user's computer and the
Internet.
C) An ISP provides free access to the Internet.
D) An ISP serves as a user's gateway to the Internet.
Answer: D
Page Ref: 135
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Compare and contrast different ways of connecting to the Internet

17) Which of the following is true of DSL modems?


A) DSL modems use television lines for data transmission.
B) Their signals do not interfere with voice telephone service.
C) DSL modems use the same protocols as cable modems.
D) DSL services and speed are standardized across applications.
Answer: B
Page Ref: 135
Difficulty: Moderate
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Compare and contrast different ways of connecting to the Internet

18) Which of the following is true of cable modems?


A) Cable modems provide high-speed data transmission using telephone cables.
B) Performance of cable modems is stable irrespective of the number of users sending and
receiving data.
C) Cable modems generally use the same protocols as DSL modems.
D) The signals from cable modems do not interfere with TV signals.
Answer: D
Page Ref: 135
Difficulty: Moderate
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Compare and contrast different ways of connecting to the Internet

7
Copyright © 2014 Pearson Education, Inc.
19) Narrowband lines typically have transmission speeds less than ________.
A) 256 kbps
B) 56 kbps
C) 126 kbps
D) 64 kbps
Answer: B
Page Ref: 135
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Compare and contrast different ways of connecting to the Internet

20) Which of the following purposes does an HTTP protocol serve?


A) flow among switches and access points
B) provide reliable internet transporting
C) enable communication among programs
D) conduct internet routing
Answer: C
Page Ref: 138
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 3
Learning Outcome: Compare and contrast different ways of connecting to the Internet

21) The S in HTTPS stands for ________.


A) site
B) safety
C) speed
D) secure
Answer: D
Page Ref: 139
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 3
Learning Outcome: Compare and contrast different ways of connecting to the Internet

22) One very common use of FTP is to ________.


A) maintain Web sites
B) transmit emails
C) format responses
D) implement protocol
Answer: A
Page Ref: 139
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 3
Learning Outcome: Describe the components of an information system (IS)

8
Copyright © 2014 Pearson Education, Inc.
23) The ________ is the Internet-based network of browsers and servers that process HTTP or
HTTPS.
A) FTP
B) SMTP
C) Web
D) Data link
Answer: C
Page Ref: 139
Difficulty: Moderate
AACSB: Use of Information Technology
Study Question: Study Question 3
Learning Outcome: Describe the major types of computer hardware and software used by
companies

24) Which of the following provides reliable internet transport?


A) HTTP
B) TCP
C) FTP
D) DSL
Answer: B
Page Ref: 139
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 3
Learning Outcome: Compare and contrast different ways of connecting to the Internet

25) When an individual uses the Internet, but not the Web, he or she is using ________.
A) FTP
B) HTTP
C) SOAP
D) XUP
Answer: A
Page Ref: 139
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 3
Learning Outcome: Compare and contrast different ways of connecting to the Internet

9
Copyright © 2014 Pearson Education, Inc.
26) What is an IP address?
A) It is a protocol that specifies the routing of the pieces of your data communication through the
networks that comprise any internet (including the Internet).
B) It is a number that identifies a particular device.
C) It is a piece of a message that is handled by programs that implement IP.
D) It is a program that breaks your traffic up into pieces and sends each piece along its way.
Answer: B
Page Ref: 140
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 3
Learning Outcome: Compare and contrast different ways of connecting to the Internet

27) A ________ must be used to convert a computer's digital data to an analog, or wavy, signal.
A) tunnel
B) switch
C) modem
D) router
Answer: C
Page Ref: 141
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 3
Learning Outcome: Describe the major types of computer hardware and software used by
companies

28) A(n) ________ is a unique name that is affiliated with a public IP address.
A) tag
B) protocol
C) domain name
D) assigned name
Answer: C
Page Ref: 141
Difficulty: Moderate
AACSB: Use of Information Technology
Study Question: Study Question 3
Learning Outcome: Describe the components of an information system (IS)

10
Copyright © 2014 Pearson Education, Inc.
29) Which of the following means an address on the Internet?
A) FTP
B) DSL
C) URL
D) ISP
Answer: C
Page Ref: 141
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 3
Learning Outcome: Describe the components of an information system (IS)

30) What is a VPN?


A) It is a markup language that fixes several HTML deficiencies and is commonly used for
program-to-program interaction over the Web.
B) It is an add-on to browsers that was developed by Adobe and is useful for providing
animation, movies, and other advanced graphics inside a browser.
C) It is the most common language for defining the structure and layout of Web pages.
D) It uses the Internet to create private point-to-point connections.
Answer: D
Page Ref: 142
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 4
Learning Outcome: Compare and contrast different ways of connecting to the Internet

31) Which of the following is true of VPN?


A) VPN communications are secure even though they are transmitted over the public Internet.
B) One disadvantage of VPN is that it does not encrypt messages.
C) Remote access is difficult in case of VPN.
D) It is a virtual, private pathway over a public or shared network from the client to the server.
Answer: A
Page Ref: 142
Difficulty: Moderate
AACSB: Use of Information Technology
Study Question: Study Question 4
Learning Outcome: Compare and contrast different ways of connecting to the Internet

11
Copyright © 2014 Pearson Education, Inc.
32) Which of the following is a component of the user tier?
A) computers that have browsers that request and process Web pages
B) computers that run Web servers and process application programs
C) computers that run a DBMS that processes SQL requests
D) computers that work to minimize customer delays in a facility called a Web farm
Answer: A
Page Ref: 144
Difficulty: Moderate
AACSB: Use of Information Technology
Study Question: Study Question 4
Learning Outcome: Describe the components of an information system (IS)

33) In the three-tier architecture arrangement, what is the second tier?


A) Web tier
B) database tier
C) server tier
D) user tier
Answer: C
Page Ref: 144
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 4
Learning Outcome: Describe the components of an information system (IS)

34) A ________ receives requests from users via the Web server, takes some action, and returns
a response to the users via the Web server.
A) database server
B) commerce server
C) URL
D) Web farm
Answer: B
Page Ref: 145
Difficulty: Moderate
AACSB: Use of Information Technology
Study Question: Study Question 4
Learning Outcome: Compare and contrast different ways of connecting to the Internet

12
Copyright © 2014 Pearson Education, Inc.
35) Which of the following is true of Web servers?
A) They are not programs.
B) They run on a user tier computer.
C) They can manage items in a shopping cart.
D) They send and receive Web pages to and from clients.
Answer: D
Page Ref: 145
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 4
Learning Outcome: Compare and contrast different ways of connecting to the Internet

36) ________ is the most common language for defining the structure and layout of Web pages.
A) HTML
B) VPN
C) Flash
D) XML
Answer: A
Page Ref: 145
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 4
Learning Outcome: Compare and contrast different ways of connecting to the Internet

True or False

1) With a WAN, an organization can place communications lines wherever it wants because all
lines reside on its premises.
Answer: FALSE
Page Ref: 131
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 1
Learning Outcome: Describe the components of an information system (IS)

2) A protocol is a set of rules that two communicating devices follow.


Answer: TRUE
Page Ref: 131
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 1
Learning Outcome: Describe the components of an information system (IS)

13
Copyright © 2014 Pearson Education, Inc.
3) A Local Area Network (LAN) would be used to connect computers located in Seattle and
Philadelphia.
Answer: FALSE
Page Ref: 131
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 1
Learning Outcome: Describe the major types of computer hardware and software used by
companies

4) A SOHO LAN requires that a dozen or more computers and printers be connected.
Answer: FALSE
Page Ref: 132
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Describe the major types of computer hardware and software used by
companies

5) LAN connections cannot be made with optical fiber cables.


Answer: FALSE
Page Ref: 133
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Describe the major types of computer hardware and software used by
companies

6) Each wired computer or printer on the LAN has a network interface card (NIC).
Answer: TRUE
Page Ref: 133
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Describe the major types of computer hardware and software used by
companies

7) An access point is a special-purpose computer that receives and transmits wired traffic on the
LAN.
Answer: FALSE
Page Ref: 133
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Describe the major types of computer hardware and software used by
companies

14
Copyright © 2014 Pearson Education, Inc.
8) Very few LAN connections are made using unshielded twisted pair (UTP) cable.
Answer: FALSE
Page Ref: 133
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Describe the major types of computer hardware and software used by
companies

9) Optical fiber cables carry light ray signals.


Answer: TRUE
Page Ref: 133
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Compare and contrast different ways of connecting to the Internet

10) The most popular protocol for WAN is the IEEE 802.3 protocol.
Answer: FALSE
Page Ref: 133
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Compare and contrast different ways of connecting to the Internet

11) The IEEE 802.3 protocol is used for wired LAN connections.
Answer: TRUE
Page Ref: 133
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Compare and contrast different ways of connecting to the Internet

12) Wireless mice use Bluetooth to connect to the computer.


Answer: TRUE
Page Ref: 134
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Describe the major types of computer hardware and software used by
companies

15
Copyright © 2014 Pearson Education, Inc.
13) Bluetooth is a protocol that can transmit data over long distances.
Answer: FALSE
Page Ref: 134
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Describe the major types of computer hardware and software used by
companies

14) DSL operates on the same lines as voice telephones.


Answer: TRUE
Page Ref: 135
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Compare and contrast different ways of connecting to the Internet

15) Leased lines are also called PSDN.


Answer: TRUE
Page Ref: 135
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Compare and contrast different ways of connecting to the Internet

16) Cable modems provide high-speed data transmission using phone lines.
Answer: FALSE
Page Ref: 135
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Compare and contrast different ways of connecting to the Internet

17) Narrowband lines have speeds greater than 256 kbps.


Answer: FALSE
Page Ref: 135
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Compare and contrast different ways of connecting to the Internet

16
Copyright © 2014 Pearson Education, Inc.
18) Broadband lines have speeds less than 56 kbps.
Answer: FALSE
Page Ref: 135
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Compare and contrast different ways of connecting to the Internet

19) The protocols used on the Internet are arranged according to a structure known as the TCP/IP
Protocol architecture.
Answer: TRUE
Page Ref: 138
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 3
Learning Outcome: Compare and contrast different ways of connecting to the Internet

20) The TCP/IP Protocol architecture is a scheme of a single protocol type.


Answer: FALSE
Page Ref: 138
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 3
Learning Outcome: Compare and contrast different ways of connecting to the Internet

21) An HTTPS connection is a secure connection.


Answer: TRUE
Page Ref: 139
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 3
Learning Outcome: Compare and contrast different ways of connecting to the Internet

22) File Transfer Protocol is used for email transmissions.


Answer: FALSE
Page Ref: 139
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 3
Learning Outcome: Compare and contrast different ways of connecting to the Internet

17
Copyright © 2014 Pearson Education, Inc.
23) An access name is a unique name that is affiliated with a public IP address.
Answer: FALSE
Page Ref: 141
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 3
Learning Outcome: Compare and contrast different ways of connecting to the Internet

24) Routers convert digital data into analog signals.


Answer: FALSE
Page Ref: 141
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 3
Learning Outcome: Describe the major types of computer hardware and software used by
companies

25) A tunnel is a virtual, private pathway over a public or shared network from the VPN client to
the VPN server.
Answer: TRUE
Page Ref: 142
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 3
Learning Outcome: Describe the major types of computer hardware and software used by
companies

26) A Virtual Private Network (VPN) is a type of LAN.


Answer: FALSE
Page Ref: 142
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 3
Learning Outcome: Describe the major types of computer hardware and software used by
companies

27) The user tier consists of computers, phones, and other devices.
Answer: TRUE
Page Ref: 144
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 4
Learning Outcome: Describe the components of an information system (IS)

18
Copyright © 2014 Pearson Education, Inc.
28) The server tier consists of computers that run a DBMS that processes SQL requests to
retrieve and store data.
Answer: FALSE
Page Ref: 144
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 4
Learning Outcome: Describe the components of an information system (IS)

29) To ensure acceptable performance, commercial Web sites usually are supported by several or
even many Web server computers in a facility called a Web farm.
Answer: TRUE
Page Ref: 145
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 4
Learning Outcome: Describe the components of an information system (IS)

30) Hyperlinks are pointers to other Web pages.


Answer: TRUE
Page Ref: 145
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 4
Learning Outcome: Compare and contrast different ways of connecting to the Internet

Essay

1) What is the difference between a LAN and a WAN? Give an example of how each one could
be used in business.
Answer: A local area network (LAN) connects computers that reside in a single geographic
location on the premises of the company that operates the LAN. Wide area networks (WANs)
connect computers at different geographic locations. The computers in two separated company
sites must be connected using a WAN. With a LAN, the number of connected computers can
range from two to several hundred, but they are still in a single location (usually within a
building or floor of a building). Most small businesses have a LAN in their office that connects
them. For example: a university campus uses a backbone (usually fiber optic) to connect all the
different buildings on the campus and possibly multiple campuses on the university's WAN.
Page Ref: 131
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 1
Learning Outcome: Describe the components of an information system (IS)

19
Copyright © 2014 Pearson Education, Inc.
2) What is an NIC? Why is it important to a LAN?
Answer: Each wired computer or printer on the LAN has a network interface card (NIC), which
is a device that connects the computer's or printer's circuitry to the network wires. The NIC
works with programs in each device to implement the protocols necessary for communication.
Most computers today ship from the factory with an onboard NIC, which is an NIC built into the
computer's circuitry.
Page Ref: 133
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Describe the major types of computer hardware and software used by
companies

3) How does a wireless NIC work?


Answer: The WNIC devices connect to an access point, which is the component of the LAN
device that processes wireless traffic and communicates with the wired switch. Thus, with this
design every device on the LAN, whether wired or wireless, can communicate with every other
device. Wireless devices communicate to each other via the access point. If wireless devices
need to connect to a wired device, they do so via the access point, then to the switch, and then to
the wired devices.
Similarly, wired devices communicate to each other via the switch. If the wired devices need to
connect to wireless ones, they do so via the switch, then to the access point, and then to the
wireless devices.
Page Ref: 133
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Describe the components of an information system (IS)

4) What is Bluetooth? What are its uses?


Answer: Bluetooth is a common wireless protocol. It is designed for transmitting data over short
distances, replacing cables. Some devices, such as wireless mice and keyboards, use Bluetooth to
connect to the computer. Smartphones use Bluetooth to connect to automobile entertainment
systems.
Page Ref: 134
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Describe the major types of computer hardware and software used by
companies

20
Copyright © 2014 Pearson Education, Inc.
5) What are the three important functions of an ISP?
Answer: An ISP has three important functions. First, it provides the client with a legitimate
Internet address. Second, it serves as a gateway to the Internet. The ISP receives the
communications from the client's computer and passes them on to the Internet, and it receives
communications from the Internet and passes them on to the client. Finally, ISPs pay for the
Internet. They collect money from their customers and pay access fees and other charges on their
behalf.
Page Ref: 134-135
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Compare and contrast different ways of connecting to the Internet

6) What are cable modems?


Answer: Cable modems provide high-speed data transmission using cable television lines. The
cable company installs a fast, high-capacity optical fiber cable to a distribution center in each
neighborhood that it serves. At the distribution center, the optical fiber cable connects to regular
cable-television cables that run to subscribers' homes or businesses.
Cable modems modulate in such a way that their signals do not interfere with TV signals.
Because up to 500 user sites can share these facilities, performance varies depending on how
many other users are sending and receiving data. At the maximum, users can download data up
to 50 Mbps and can upload data at 512 kbps.
Page Ref: 135
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 2
Learning Outcome: Compare and contrast different ways of connecting to the Internet

7) What is the IP Protocol architecture?


Answer: The protocols used on the Internet are arranged according to a structure known as the
TCP/IP Protocol architecture, which is a scheme of five protocol types arranged in layers. The
top layer concerns protocols for applications such as browsers and Web servers. The next two
layers concern protocols about data communications across any internet, including the Internet.
The bottom two layers involve protocols that concern data transmission within a network. For
example, the IEEE 802.3 and 802.11 LAN protocols operate at the bottom two layers.
Page Ref: 138
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 3
Learning Outcome: Compare and contrast different ways of connecting to the Internet

21
Copyright © 2014 Pearson Education, Inc.
8) Name some common application layer protocols.
Answer: The TCP/IP application layer protocols are common. SMTP, or Simple Mail Transfer
Protocol, is used for email transmissions (along with other protocols as well). And FTP, or File
Transfer Protocol, is used to move files over the Internet. One very common use for FTP is to
maintain Web sites. When a Web site administrator wishes to post a new picture or story on a
Web server, the administrator will often use FTP to move the picture or other item to the server.
Page Ref: 138-139
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 3
Learning Outcome: Compare and contrast different ways of connecting to the Internet

9) Explain Transmission Control Protocol (TCP).


Answer: The most important protocol in the transport layer is TCP, or the Transmission Control
Protocol. As a transport protocol, TCP has many complicated functions. One easily understood
function is that TCP programs break traffic up into pieces and send each piece along its way. It
then works with TCP programs on other devices in the internet to ensure that all of the pieces
arrive at their destination. If one or more pieces are lost or damaged, TCP programs detect that
condition and cause retransmission of that piece. Hence, the TCP layer is said to provide reliable
internet transport.
Page Ref: 139
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 3
Learning Outcome: Compare and contrast different ways of connecting to the Internet

10) Differentiate between private and public IP addresses.


Answer: Public IP addresses identify a particular device on the public Internet. Because public
IP addresses must be unique, worldwide, their assignment is controlled by a public agency
known as ICANN (Internet Corporation for Assigned Names and Numbers). Private IP addresses
identify a particular device on a private network, usually on a LAN. Their assignment is
controlled within the LAN, usually by the "LAN device".
Page Ref: 140
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 3
Learning Outcome: Compare and contrast different ways of connecting to the Internet

22
Copyright © 2014 Pearson Education, Inc.
11) What is a domain name? What is the procedure to get a domain name?
Answer: A domain name is a worldwide-unique name that is affiliated with a public IP address.
When an organization or individual wants to register a domain name, it goes to a company that
applies to an ICANN-approved agency to do so. The company will first determine if the desired
name is unique, worldwide. If so, then it will apply to register that name to the applicant. Once
the registration is completed, the applicant can affiliate a public IP address with the domain
name. From that point onward, traffic for the new domain name will be routed to the affiliated IP
address.
Page Ref: 141
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 3
Learning Outcome: Describe the components of an information system (IS)

12) What is a VPN and how does it work?


Answer: VPN stands for a virtual private network and is an alternative to a WAN. A VPN uses
the Internet or a private internet to create the appearance of private point-to-point connections.
This connection, called a tunnel, is a virtual, private pathway over a public or shared network
from the VPN client to the VPN server.
Page Ref: 142
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 3
Learning Outcome: Describe the components of an information system (IS)

13) What are the different tiers in the three-tier architecture?


Answer: Almost all e-commerce applications use the three-tier architecture, which is an
arrangement of user computers and servers into three categories, or tiers. The user tier consists of
computers, phones, and other devices that have browsers that request and process Web pages.
The server tier consists of computers that run Web servers and process application programs.
The database tier consists of computers that run a DBMS that processes SQL requests to retrieve
and store data.
Page Ref: 144
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 4
Learning Outcome: Describe the components of an information system (IS)

23
Copyright © 2014 Pearson Education, Inc.
14) What is the difference between a Web server and a commerce server?
Answer: Web servers are programs that run on a server-tier computer and that manage HTTP
traffic by sending and receiving Web pages to and from clients. A commerce server is an
application program that runs on a server-tier computer. A commerce server receives requests
from users via the Web server, takes some action, and returns a response to the users via the Web
server. Typical commerce server functions are to obtain product data from a database, manage
the items in a shopping cart, and coordinate the checkout process.
Page Ref: 145
Difficulty: Easy
AACSB: Use of Information Technology
Study Question: Study Question 4
Learning Outcome: Describe the components of an information system (IS)

24
Copyright © 2014 Pearson Education, Inc.

You might also like