Tuesday, January 14, 2020

E-commerce 2019 - Chapter 3 and Answers

E-commerce 2019: business. technology. society., 15e (Laudon/Traver)
Chapter 3   E-commerce Infrastructure: The Internet, Web, and Mobile Platform

1) During which period of time did the Institutionalization phase of Internet development take place?
A) 1950-1960
B) 1961-1974
C) 1975-1995
D) 1995-through the present
Answer:  C
Difficulty:  Moderate
AACSB:  Application of knowledge
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

2) Which of the following occurred during the Commercialization phase of Internet development?
A) The fundamental building blocks of the Internet were realized in actual hardware and software.
B) Personal computers were invented.
C) The Domain Name System was introduced.
D) NSF privatized the operation of the Internet's backbone.
Answer:  D
Difficulty:  Difficult
AACSB:  Application of knowledge
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

3) During which phase of the development of the Internet was the Domain Name System (DNS) introduced?
A) commercialization phase
B) institutional phase
C) innovation phase
D) consolidation phase
Answer:  B
Difficulty:  Difficult
AACSB:  Application of knowledge
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

4) Which of the following is not one of the basic technological foundations of the Internet?
A) client/server computing
B) FTP
C) TCP/IP
D) packet switching
Answer:  B
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.
5) The process of slicing digital messages into parcels, sending them along different communication paths as they become available, and reassembling them at the destination point is called:
A) routing.
B) the Transmission Control Protocol.
C) packet switching.
D) the File Transfer Protocol.
Answer:  C
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

6) Which of the following is the core communications protocol for the Internet?
A) Telnet
B) FTP
C) TCP/IP
D) TLS
Answer:  C
Difficulty:  Easy
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

7) The Transport Layer of TCP/IP is responsible for which of the following?
A) placing packets on and receiving them from the network medium
B) addressing, packaging, and routing messages
C) providing communication with the application by acknowledging and sequencing the packets to and from the application
D) providing a variety of applications with the ability to access the services of the lower layers
Answer:  C
Difficulty:  Difficult
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

8) The Internet Layer of TCP/IP is responsible for which of the following?
A) placing packets on and receiving them from the network medium
B) addressing, packaging, and routing messages
C) providing communication with the application by acknowledging and sequencing the packets to and from the application
D) providing a variety of applications with the ability to access the services of the lower layers
Answer:  B
Difficulty:  Difficult
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.
9) An IPv4 address is expressed as a:
A) 32-bit number that appears as a series of four separate numbers separated by semicolons.
B) 64-bit number that appears as a series of four separate numbers separated by semicolons.
C) 64-bit number that appears as a series of four separate numbers separated by periods.
D) 32-bit number that appears as a series of four separate numbers separated by periods.
Answer:  D
Difficulty:  Difficult
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

10) The ________ allows a natural language expression, such as Google.com to represent a numeric IP address.
A) uniform resource locator system
B) Internet protocol addressing schema
C) domain name system
D) assigned numbers and names (ANN) system
Answer:  C
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

11) The address used by a browser to identify the location of content on the Web is called:
A) a domain name.
B) a uniform resource locator.
C) an IP address.
D) a file path.
Answer:  B
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

12) Which of the following is not an advantage of client/server computing over centralized mainframe computing?
A) It is easy to expand capacity by adding servers and clients.
B) Each client added to the network increases the network's overall capacity and transmission speeds.
C) Client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer.
D) There is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down.
Answer:  B
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.
13) ________ is a model of computing in computer processing, storage, software, and other services which are provided as a shared pool of virtualized resources over the Internet.
A) Client/server computing
B) P2P computing
C) Mobile computing
D) Cloud computing
Answer:  D
Difficulty:  Difficult
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

14) Which of the following protocols is used to send mail to a server?
A) SMTP
B) FTP
C) HTTP
D) SSL
Answer:  A
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

15) Where does TLS operate within TCP/IP?
A) between the Internet Layer and the Transport Layer
B) between the Transport Layer and the Application Layer
C) between the Network Interface Layer and the Transport Layer
D) between the Internet Layer and the Application Layer
Answer:  B
Difficulty:  Difficult
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

16) Which of the following statements about cloud computing is not true?
A) A public cloud is typically used by companies with stringent privacy and security requirements.
B) Dropbox is an example of a public cloud.
C) Hybrid clouds offer both public and private cloud options.
D) A private cloud may be hosted internally or externally.
Answer:  A
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

17) ________ is used to allow remote login on another computer.
A) Telnet
B) FTP
C) HTTP
D) SSL
Answer:  A
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.
18) ________ is a utility program that allows you to check the connection between your client and a TCP/IP network.
A) Ping
B) Telnet
C) Tracert
D) Finger
Answer:  A
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

19) Which of the following technologies has enabled the Internet to grow exponentially to support millions of users, without overloading the network architecture?
A) fiber optics
B) Wi-Fi
C) IPv6
D) client/server computing
Answer:  D
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

20) Which of the following are specialized computers that transmit message parcels along available Internet communication paths and on to their destinations?
A) routers
B) Web servers
C) IP servers
D) packet servers
Answer:  A
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

21) Which of the following is a set of rules for transferring data?
A) protocol
B) packet
C) router
D) IP address
Answer:  A
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

22) Which of the following is not a basic type of cloud computing service?
A) IaaS
B) PaaS
C) SaaS
D) FiOS
Answer:  D
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.
23) Which of the following are central directories that list all domain names currently in use for specific domains?
A) Web servers
B) root servers
C) client servers
D) DNS servers
Answer:  B
Difficulty:  Difficult
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

24) Which of the following was the original purpose of the Internet?
A) to provide a network that would allow businesses to connect with consumers
B) to link large mainframe computers on different college campuses
C) to develop a military communications system that could withstand nuclear war
D) to enable government agencies to track civilian communications
Answer:  B
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

25) Which of the following is a utility program that allows you to track the path of a message sent from a client computer to a remote computer on the Internet?
A) Telnet
B) Ping
C) IMAP
D) Tracert
Answer:  D
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

26) Which of the following protocols enables the exchange of routing information among different autonomous systems on the Internet?
A) HTTP
B) BGP
C) FTP
D) SMTP
Answer:  B
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

27) The term latency refers to a delay that can be experienced in packet-switched networks.
Answer:  TRUE
Difficulty:  Easy
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.
28) FTP is the protocol that permits users to transfer files from a server to their client computer, and vice versa.
Answer:  TRUE
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

29) IMAP is the Internet protocol used by a browser to transfer web pages.
Answer:  FALSE
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

30) A private cloud is operated for the benefit of multiple firms.
Answer:  FALSE
Difficulty:  Easy
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

31) Amazon Web Services is an example of a private cloud.
Answer:  FALSE
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

32) HTTP/2 is supported by almost all the leading web browsers.
Answer:  TRUE
Difficulty:  Easy
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

33) In a hybrid cloud computing model, firms use their own infrastructure for their most essential core activities.
Answer:  TRUE
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

34) What are the essential characteristics of cloud computing?
Answer:  The U.S. National Institute of Standards and Technology (NIST) defines cloud computing as having the following essential characteristics: on-demand self-service (consumers can obtain computing capabilities such as server time or network storage as needed automatically on their own); ubiquitous network access (cloud resources can be accessed using standard network and Internet devices, including mobile platforms); Location-independent resource pooling (the pooling of computing resources to serve multiple users, with different virtual resources dynamically assigned according to user demand); rapid elasticity (computing resources can be rapidly provisioned, increased, or decreased to meet changing user demand); and measured service (charges for cloud resources are based on the amount of resources actually used).
Difficulty:  Moderate
AACSB:  Analytical thinking; Information technology; Written and oral communication
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.
35) What are the implications of cloud computing for e-commerce?
Answer:  Cloud computing has many significant implications for e-commerce. For e-commerce firms, cloud computing radically reduces the cost of building and operating websites because the necessary hardware infrastructure and software can be licensed as a service from cloud service providers at a fraction of the cost of purchasing these services as products. This means firms can adopt "pay-as-you-go" and "pay-as-you-grow" strategies when building out their websites. For instance, according to Amazon, hundreds of thousands of customers use Amazon Web Services. For individuals, cloud computing means you no longer need a powerful laptop or desktop computer to engage in e-commerce or other activities. Instead, you can use much less-expensive tablet computers or smartphones that cost far less. For corporations, cloud computing means that a significant part of hardware and software costs (infrastructure costs) can be reduced because firms can obtain these services online for a fraction of the cost of owning, and they don't have to hire an IT staff to support the infrastructure.
Difficulty:  Moderate
AACSB:  Analytical thinking; Information technology; Written and oral communication
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.
36) Explain each of the three important concepts behind the Federal Networking Council's definition of the term Internet. Explain how each technology contributes to the functioning of the Internet today.
Answer:  The three important concepts in the Federal Networking Council's definition of the Internet are packet switching, the TCP/IP communications protocol, and client/server computing.

Packet switching is a method of slicing digital messages up into parcels that are sent along different communications paths as they become available. The packets travel from router computer to router computer and are then reassembled at their destination point. These routers are special purpose computers that interconnect the thousands of computer networks that make up the Internet. Since this method does not require a dedicated circuit, it makes use of any available spare capacity on any one of several hundred circuits enabling nearly full use of available communication lines and capacity.

Transmission Control Protocol/Internet Protocol (TCP/IP) is the universally agreed upon method for breaking the messages up, routing them to their destination, and reassembling them. The TCP protocol, or set of rules, specifies how messages should be formatted, ordered, compressed, and error-checked. It also stipulates which method the network will use to indicate that they have stopped sending and/or receiving messages and sometimes specifies the transmission speed as well. The IP protocol provides the addressing scheme for the Internet. Each computer connected to the Internet must be assigned an Internet Protocol address so that it can send and receive TCP packets. At present, each time home users sign on to the Internet they are temporarily assigned an IP address by their ISP.

Client/server computing involves very powerful personal computers connected in a network along with one or more server computers. These client computers can display rich graphics, store large files, and process graphic and sound files. The server computers are specifically allocated to common functions that all client computers need such as storing files and supplying software applications, and utility programs.
Difficulty:  Difficult
AACSB:  Analytical thinking; Information technology; Written and oral communication
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.

37) Which of the following organizations monitor Internet policies and practices?
A) IETF
B) ISOC
C) W3C
D) ICANN
Answer:  B
Difficulty:  Moderate
AACSB:  Application of knowledge
Learning Objective:  3.2: Explain the current structure of the Internet.
38) TCP/IP operates in which layer of Internet architecture?
A) Network Technology Substrate layer
B) Middleware Services layer
C) Transport Services and Representation Standards layer
D) Applications layer
Answer:  C
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.2: Explain the current structure of the Internet.

39) The Web runs in which layer of Internet architecture?
A) Network Technology Substrate layer
B) Middleware Services layer
C) Transport Services and Representation Standards layer
D) Applications layer
Answer:  D
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.2: Explain the current structure of the Internet.

40) The layer of Internet architecture that ties the applications to the communications network and includes security and authentication services is called the:
A) Network Technology Substrate layer.
B) Middleware Services layer.
C) Transport Services and Representation Standards layer.
D) Applications layer.
Answer:  B
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.2: Explain the current structure of the Internet.

41) The backbone of the Internet is formed by:
A) Internet Exchange Points (IXPs).
B) Tier 1 ISPs.
C) Network Access Points (NAPs).
D) Metropolitan Area Exchanges (MAEs).
Answer:  B
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.2: Explain the current structure of the Internet.

42) When talking about the physical elements of the Internet, the term redundancy refers to:
A) transmitting multiple copies of a single packet to safeguard against data loss.
B) the use of tiered high-speed switching computers to connect the backbone to regional and local networks.
C) delays in messages caused by the uneven flow of information through the network.
D) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.
Answer:  D
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.2: Explain the current structure of the Internet.
43) The ________ is a consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices.
A) Internet Engineering Steering Group (IESG)
B) World Wide Web Consortium (W3C)
C) Internet Engineering Task Force (IETF)
D) Internet Society (ISOC)
Answer:  D
Difficulty:  Moderate
AACSB:  Application of knowledge
Learning Objective:  3.2: Explain the current structure of the Internet.

44) The ________ helps define the overall structure of the Internet.
A) IAB
B) IESG
C) W3C
D) ITU
Answer:  A
Difficulty:  Moderate
AACSB:  Application of knowledge
Learning Objective:  3.2: Explain the current structure of the Internet.

45) Which of the following is not true about the mobile platform?
A) Most smartphones use Intel chips.
B) Smartphones and tablet computers are the primary means to access the Internet, both in the United States and worldwide.
C) Most smartphones use either Google's Android or Apple's iOS operating systems.
D) Smartphones use flash memory chips.
Answer:  A
Difficulty:  Difficult
AACSB:  Application of knowledge
Learning Objective:  3.2: Explain the current structure of the Internet.

46) Which of the following organizations involved with Internet governance has the United States recently given up control over?
A) ICANN
B) IGF
C) NTIA
D) IANA
Answer:  D
Difficulty:  Moderate
AACSB:  Application of knowledge
Learning Objective:  3.2: Explain the current structure of the Internet.

47) In the United States, about ________ of Internet traffic now occurs over Internet Protocol version 6 (IPv6).
A) 10%
B) 15%
C) 25%
D) 40%
Answer:  D
Difficulty:  Moderate
AACSB:  Application of knowledge
Learning Objective:  3.1: Discuss the origins of, and the key technology concepts behind, the Internet.
48) The major hubs in the United States where the Internet backbone intersects with regional and local networks are now commonly referred to as Internet Exchange Points (IXPs).
Answer:  TRUE
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.2: Explain the current structure of the Internet.

49) T1 and T3 refer to international telephone standards for digital communication.
Answer:  TRUE
Difficulty:  Easy
AACSB:  Information technology
Learning Objective:  3.2: Explain the current structure of the Internet.

50) Bluetooth is a high-speed, fixed broadband wireless local area network for commercial and residential use.
Answer:  FALSE
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.2: Explain the current structure of the Internet.

51) Tier 1 ISPs provide Internet access to consumers and businesses.
Answer:  FALSE
Difficulty:  Easy
AACSB:  Information technology
Learning Objective:  3.2: Explain the current structure of the Internet.
52) Identify and describe the two types of ISP service, along with the Internet connection methods, in use today.
Answer:  There are two types of ISP service: narrowband and broadband. Narrowband service is the traditional telephone modem connection now operating at 56.6 Kbps (although the actual throughput hovers around 30 Kbps due to line noise that causes extensive resending of packets). This used to be the most common form of connection worldwide but has been replaced by broadband connections in most of the United States, Europe, and Asia.

Broadband service is based on DSL, cable modem, telephone (T1 and T3 lines), and satellite technologies. Broadband — in the context of Internet service — refers to any communication technology that permits clients to play streaming audio and video files at acceptable speeds — generally anything above .5 Mbps.

Digital Subscriber Line (DSL) service is a telephone technology for delivering high-speed access to the Internet through ordinary telephone lines found in a home or business. Cable Internet refers to a cable television technology that provides digital access to the Internet using the same analog or digital video cable providing television signals to a home. T1 and T3 are international telephone standards for digital communication. These are leased, dedicated, guaranteed lines suitable for corporations, government agencies, and businesses such as ISPs requiring high-speed guaranteed service levels. Additionally, some satellite companies offer high-speed broadband Internet access primarily to homes and offices located in rural areas where DSL or cable Internet access is not available. Access speeds and monthly costs are comparable to DSL and cable.
Difficulty:  Moderate
AACSB:  Analytical thinking; Information technology; Written and oral communication
Learning Objective:  3.2: Explain the current structure of the Internet.

53) You are browsing the Web on your tablet computer. Describe the web page data path from its origination point on a distant computer to your tablet.
Answer:  The web page information starts from where it is hosted on a web server and travels through the host company's network to the Internet. On the Internet, the data will pass through the ISP's network to regional and national backbones, and finally to the network of the ISP that is serving my personal network, and through an access point or hot spot to be delivered wirelessly to my tablet.
Difficulty:  Moderate
AACSB:  Analytical thinking; Information technology; Written and oral communication
Learning Objective:  3.2: Explain the current structure of the Internet.

54) Which of the following is not a concern about IoT?
A) the falling cost of sensors
B) interoperability
C) security
D) privacy
Answer:  A
Difficulty:  Easy
AACSB:  Information technology
Learning Objective:  33.2: Explain the current structure of the Internet.

55) What type of Internet access technology are Google and Facebook hoping to use to provide Internet access to remote parts of the world?
A) Bluetooth
B) drones
C) WLANs
D) EDI
Answer:  B
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.2: Explain the current structure of the Internet.


56) Which of the following statements about fiber-optic cable is not true?
A) It transmits more data at faster speeds than coaxial or twisted pair cable.
B) It is thinner and lighter than coaxial or twisted pair cable.
C) Most U.S. homes have fiber connections.
D) Long-haul fiber optic networks are typically owned by firms referred to as Tier I ISPs.
Answer:  C
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.2: Explain the current structure of the Internet.
57) The major technologies used with wireless local area networks are:
A) Wi-Fi and Bluetooth.
B) Wi-Fi and WiMax.
C) Bluetooth and 3G.
D) WiMax and 3G.
Answer:  A
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.2: Explain the current structure of the Internet.

58) Which of the following IEEE standards provide for high-speed short-range Wi-Fi?
A) 802.11ad
B) 802.11ay
C) 802.11ah
D) 802.11af
Answer:  A
Difficulty:  Difficult
AACSB:  Information technology
Learning Objective: 3.2: Explain the current structure of the Internet.

59) All of the following are involved in the effort to create standards for IoT except:
A) AllSeen Alliance.
B) Industrial Internet Consortium.
C) Open Connectivity Foundation.
D) W3C.
Answer:  D
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.2: Explain the current structure of the Internet.

60) All of the following either currently, or have plans to, offer Internet access via satellite except:
A) Facebook
B) Dish
C) Microsoft
D) Boeing
Answer:  C
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.2: Explain the current structure of the Internet.
61) Microsoft's pilot program to provide broadband Internet access to rural areas uses which of the following technologies?
A) satellites
B) drones
C) unused, low-powered television channels
D) high altitude balloons
Answer:  C
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.2: Explain the current structure of the Internet.

62) The United States has the world’s highest average Internet connection speed.
Answer:  FALSE
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.2: Explain the current structure of the Internet.

63) WLAN-based Internet access derives from the same technological foundations as telephone-based wireless Internet access.
Answer:  FALSE
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.2: Explain the current structure of the Internet.

64) The Internet of Things (IoT) is based on sensors that can collect data and connect to the Internet.
Answer:  TRUE
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.2: Explain the current structure of the Internet.

65) Describe and discuss 5G.
Answer:  5G is a new cellular standard being developed for high-bandwidth mobile broadband. Although official standards are not expected to be fully rolled out for a few years, 5G is expected to provide for speeds reaching 10 Gbps or more, support for up to 100,000 connections per square kilometer (known as massive machine-to-machine (M2M) connections), and ultra-low latency (less than 10 milliseconds) communications. Full deployment of 5G is expected to take several years, utilizing a new part of the wireless spectrum (shorter millimeter waves in the 30 GHz to 300 GHz range), and including the development of a transmission infrastructure. This proposed infrastructure will utilize tens of thousands of small cell and distributed antenna systems installed on utility poles, as well as additional investments in fiber optic networks. Telecommunications companies are expected to invest up to $5 billion. The first pre-official 5G devices launched in 2018, with more being deployed by 2019.
Difficulty:  Moderate
AACSB:  Analytical thinking; Information technology; Written and oral communication
Learning Objective:  3.2: Explain the current structure of the Internet.
66) What are some of the issues related to the Internet of Things (IoT)?
Answer:  Interoperability remains a major concern with IoT. As with many technologies in the early stages of development, many organizations are fighting to create the standards that participants in the market will follow. The AllSeen Alliance, formed by Qualcomm in 2013 with 50 other companies, including Microsoft and Cisco, was one group that hoped to create an open source standard. Membership in the Alliance soared after its initial founding and by 2016, it had over 200 members. Another group, the Open Interconnect Consortium, formed in 2014 by Intel, Broadcom, Dell, and others apparently not happy with the AllSeen effort, also reached over 200 members. In late 2016, these two groups put their differences aside and merged to create the Open Connectivity Foundation.

A different group, the Industrial Internet Consortium, was formed by AT&T, Cisco, GE, IBM, and Intel to focus on engineering standards for industrial assets. As with many other types of Internet-related technology, Google with its Android operating system and Apple with AirPlay wireless streaming protocol may be trying to create their own standards. Other concerns include security and privacy. Security experts believe that IoT devices could potentially be a security disaster, with the potential for malware being spread through a connected network, and difficulty in issuing patches to devices, leaving them vulnerable. Data from standalone smart devices can reveal much personal detail about a consumer's life, and if those devices are all ultimately interconnected, there will be little that is truly private.
Difficulty:  Moderate
AACSB:  Analytical thinking; Information technology; Written and oral communication
Learning Objective:  3.2: Explain the current structure of the Internet.

67) The first web browser to make it possible to view documents on the Web with colored background, images, and animations was:
A) Netscape Navigator.
B) Mosaic.
C) Mozilla.
D) Internet Explorer.
Answer:  B
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.3: Understand how the Web works.

68) In the address http://www.company.com/clients.html, which of the following is the top-level domain?
A) .com
B) company.com
C) www
D) http
Answer:  A
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.3: Understand how the Web works.
69) You could expect to find all of the following services in a web server software package except:
A) security services.
B) FTP.
C) search engine.
D) an RSS aggregator.
Answer:  D
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.3: Understand how the Web works.

70) Which of the following was the most popular web browser as of August 2018?
A) Internet Explorer
B) Safari
C) Chrome
D) Firefox
Answer:  C
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.3: Understand how the Web works.

71) The concept behind document formatting had its roots in which of the following?
A) XML
B) SGML
C) HTML
D) GML
Answer:  D
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.3: Understand how the Web works.

72) All of the following statements about HTML5 are true except:
A) HTML5 has become the de facto web page development standard.
B) HTML5 is an important tool for both response web design and adaptive web delivery.
C) HTML5 apps work just like web pages.
D) HTML5 stores page content into mobile device hardware rather loading into the browser from a web server.
Answer:  D
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.3: Understand how the Web works.

73) HTML defines the structure of a web page.
Answer:  TRUE
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.3: Understand how the Web works.
74) Briefly describe the development of the Web including the key players.
Answer:  The Web was invented between 1989 and 1991 when Dr. Tim Berners-Lee and his associates at CERN Laboratories built on the ideas of several earlier researchers and developed the initial versions of HTML, HTTP, a web server, and a web browser, the four essential components of the Web. Information being shared on the Web remained text-based until Marc Andreessen and others at NCSA (National Center for Supercomputing Applications) created a web browser with a graphical user interface. This made it possible to view documents on the Web that included colored backgrounds, images, and primitive animations. In 1994 Andreessen and Jim Clark founded Netscape, which created the first commercial browser. In 1995 Microsoft released the first version of Internet Explorer and the Web began to take off.
Difficulty:  Moderate
AACSB:  Analytical thinking; Information technology; Written and oral communication
Learning Objective:  3.3: Understand how the Web works.

75) Cortana is a type of:
A) intelligent digital assistant.
B) widget.
C) gadget.
D) social network.
Answer:  A
Difficulty:  Difficult
AACSB:  Information technology
Learning Objective:  3.4: Describe how Internet and web features and services support e-commerce.

76) Which of the following enables Internet users to communicate with each other, although not in real time?
A) mobile messaging
B) online forum
C) SMS messaging
D) VoIP
Answer:  B
Difficulty:  Easy
AACSB:  Information technology
Learning Objective:  3.4: Describe how Internet and web features and services support e-commerce.

77) Which of the following is not a mobile messaging application?
A) Kik
B) WhatsApp
C) Viber
D) Feedly
Answer:  D
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.4: Describe how Internet and web features and services support e-commerce.
78) A(n) ________ allows users to easily add and edit content on a web page.
A) wiki
B) podcast
C) blog
D) RSS feed
Answer:  A
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.4: Describe how Internet and web features and services support e-commerce.

79) The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called:
A) VoIP.
B) IPTP.
C) VTP.
D) IP.
Answer:  A
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.4: Describe how Internet and web features and services support e-commerce.

80) Why is VoIP considered to be a disruptive technology?
Answer:  In the past, voice and fax were the exclusive provenance of the regulated telephone networks. With the convergence of the Internet and telephone, however, this dominance is already starting to change, with local and long-distance telephone providers and cable companies becoming ISPs, and ISPs getting into the phone market. Key players in the VoIP market include independent service providers such as VoIP pioneers Vonage and Skype (now owned by Microsoft), as well as traditional players such as telephone and cable companies that have moved aggressively into the market.
Difficulty:  Moderate
AACSB:  Analytical thinking; Information technology; Written and oral communication
Learning Objective:  3.4: Describe how Internet and web features and services support e-commerce.
81) Explain how the Internet and the Web make e-commerce possible. Briefly discuss at least four features or services that support e-commerce.
Answer:  The Internet and the Web have made e-commerce possible because they have brought about an extraordinary expansion of digital services to millions of amateur computer users. The Web makes nearly all elements of rich human expression including color, text, images, photos, animations, sound, and video available, creating a unique environment in which to establish a commercial marketplace. Many of the Web's services and features support e-commerce, including communication tools such as e-mail and messaging applications, search engines and streaming media.

E-mail, for example, can be used as a very effective marketing tool. E-commerce sites can buy e-mail lists from various sources and collate them with lists of their current customers to create a targeted advertising message that can be quickly and economically delivered and will produce a creditable response.

Messaging applications such as mobile messaging apps are increasingly being used by companies to market their brands.

Search engines have also become a crucial tool on e-commerce sites, providing a method for customers to quickly locate the product category or a specific product they are looking for.

Streaming media enables online video, music, video, and other large-bandwidth files to be sent to users in a variety of ways that enable the user to play back the files. Web advertisers increasingly use video to attract viewers. Streaming audio and video segments used in online ads and news stories are perhaps the most frequently used streaming services.
Difficulty:  Difficult
AACSB:  Analytical thinking; Information technology; Written and oral communication
Learning Objective:  3.4: Describe how Internet and web features and services support e-commerce.

82) Google Cardboard is an example of which of the following?
A) virtual reality
B) artificial intelligence
C) augmented reality
D) chatbot
Answer:  A
Difficulty:  Moderate
AACSB:  Application of knowledge
Learning Objective:  3.4: Describe how Internet and web features and services support e-commerce.

83) All of the following statements about mobile apps are true except:
A) mobile apps have usurped television as the most popular entertainment medium.
B) iOS apps are cross-platform, open-source applications.
C) over 200 billion apps have been downloaded from the Apple App Store.
D) almost all the top 100 brands have a presence in at least one of the major app stores.
Answer:  B
Difficulty:  Moderate
AACSB:  Information technology
Learning Objective:  3.5: Understanding the impact of mobile applications.
84) Which of the following is a programming language introduced by Apple specifically for developing iOS applications?
A) Objective-C
B) C
C) C++
D) Swift
Answer: D
Difficulty: Moderate
AACSB: Information technology
Learning Objective:  3.5: Understanding the impact of mobile applications.

85) Applications for Android operating system-based smartphones are typically written in which of the following?
A) Swift
B) Java
C) ActiveX
D) ColdFusion
Answer: B
Difficulty: Moderate
AACSB: Information technology
Learning Objective:  3.5: Understanding the impact of mobile applications.

No comments:

Post a Comment