Free Essay

Digital Business Networks (Author: Dooley)

In:

Submitted By miayoonmiko
Words 6142
Pages 25
Digital Business Networks (Dooley)
Chapter 1 Elements of Data Communications: Analog and Digital

1.1 Multiple Choice Questions

1) What are the five evolution phases of data communications?
A) digitization, growth of data gathering, an era of delegation, the Internet as a common tool, and pervasive computing
B) analog signals, growth of data communications, an era of deregulation, the Internet as a common tool, and pervasive computing
C) digitization, growth of data communications, an era of deregulation, the Internet as a common tool, and pervasive computing
D) digitization, growth of data communications, an era of deregulation, the evolution of Voice-over-IP (VoIP) as a common tool, and pervasive computing
Answer: C
Diff: 2 Page Ref: 3

2) In what year did computer technology begin to transform our social, economic, and governmental infrastructures?
A) 1960s, when Internet became a core in our technology
B) 1950s, when ARPA research was formed
C) 1980s, when the Internet was introduced
D) 1990s, when the Internet was enhanced
Answer: A
Diff: 2 Page Ref: 3

3) The technology used in the 1960s called ________ was/were very large and expensive and used proprietary architectures that did not support cross-platform communications.
A) Department of Defense PCs
B) the Internet
C) personal computers
D) mainframes
Answer: D
Diff: 1 Page Ref: 3

4) The term ________ generally refers to a technology or product that is copyrighted and not available for use without some type of fee or payment to its owner.
A) Internet technology
B) RFID (Radio Frequency Identification) technology
C) Proprietary
D) IEEE (Institute of Electrical and Electrical Engineers) technology
Answer: C
Diff: 1 Page Ref: 3

5) A series of legal battles, beginning in the late ________ and continuing into the ________, introduced an era of deregulation that in ________ resulted in the federally mandated breakup of Bell Telephone/AT&T into two components.
A) 1970s, 1980s, 1988
B) 1960s, 1970s, 1984
C) 1960s, 1970s, 1988
D) 1980s, 1990s, 1994
Answer: B
Diff: 3 Page Ref: 4

6) A key goal of ________ is to allow competitors to enter a market so that consumers in that market can have a wider selection of service providers from which to choose.
A) digitization
B) the Internet
C) deregulation
D) All of the above.
Answer: C
Diff: 2 Page Ref: 4

7) In 1958, in response to the Soviet Union's launch of Sputnik, the U.S. Department of Defense established ________.
A) Advanced Research Projects Agency (ARPA)
B) Telecommunications Industry Association (TIA)
C) Internet Engineering Task Force (IETF)
D) Internet Assigned Numbers Authority (IANA)
Answer: A
Diff: 3 Page Ref: 4

8) The Internet mostly in use today, especially in the U.S., is known as version IPv4 (Internet Protocol version 4). What is the next improved and enhanced Internet Protocol technology?
A) Internet protocol v5
B) Internet protocol v3
C) Internet protocol v9
D) Internet protocol v6
Answer: D
Diff: 1 Page Ref: 5

9) Data communications is formally considered as a subset of ________.
A) Internet
B) AT&T Bell lab technologies
C) Telecommunications
D) All of the above
Answer: C
Diff: 2 Page Ref: 6

10) Telecommunications includes many different types of communication besides data, such as voice and video, and includes telephony, telegraphy, and television. Where does the prefix "tele" come from?
A) The Latin word communications
B) The Roman word for traveling
C) The English word for telecommute
D) The Greek word for distance
Answer: D
Diff: 2 Page Ref: 6

11) Telecommunications historically has supported other purposes beyond communications between ________ and ________.
A) computers, networks
B) World Wide Web, DNS
C) DHCP, mainframes
D) File Transfer Protocols, Proxy Servers
Answer: A
Diff: 1 Page Ref: 6

12) A number of ________, both national and international, specify how, where, when, what, and who can provide telecommunications services.
A) Internet and network organizations
B) protocols
C) standards-setting bodies
D) Internet technologies
Answer: C
Diff: 2 Page Ref: 6

13) Today, the term data encompasses a much broader range of elements, no longer consisting of just numbers and text. What other elements might data include?
A) graphic images, sound files, or video elements
B) sound files, but not video
C) video elements, but not sound files
D) None of the above
Answer: A
Diff: 1 Page Ref: 6

14) One binary coding scheme in particular that will affect data communications technologies is ________.
A) Internet subnet mask
B) Internet Protocol (IP)
C) binary code
D) Unicode
Answer: D
Diff: 2 Page Ref: 6

15) What are the three questions that must be considered with regards to data communications?
A) (1) how the data are delivered, (2) how accurate the data are once delivered, and (3) how accessible the data are to those who need to use it
B) (1) how the data are received, (2) how accurate the data are once delivered, and (3) how accessible the data are to those who need to use it
C) (1) how the data are delivered, (2) how accurate the data are once received, and (3) how accessible the data are to those who need to use it
D) (1) how the data are delivered, (2) how accurate the data are once delivered, and (3) how accessible the data are to those who sent it
Answer: A
Diff: 3 Page Ref: 7

16) A/an ________ is a set of rules that determine how something is performed or accomplished.
A) standard
B) Federal Communications Commission (FCC)
C) protocol
D) Internet Assigned Numbers Authority (IANA)
Answer: C
Diff: 1 Page Ref: 7

17) In data communications, protocols must possess how many key characteristics in order for communications to successfully and effectively occur?
A) three
B) four
C) two
D) five
Answer: B
Diff: 2 Page Ref: 7

18) When a sending device sends its data to a receiving device, the two devices must agree on the ________ of speed that will be used in the transmission.
A) protocol
B) standard
C) quality
D) rate
Answer: D
Diff: 3 Page Ref: 8

19) When two devices need to communicate, one of the devices may not be available for a variety of reasons: hardware failure, a downed communication link, ________, or ________.
A) system repair, network upgrading
B) system repair, software upgrading
C) system repair, mainframe upgrading
D) PC repair, software upgrading
Answer: B
Diff: 3 Page Ref: 8

20) Evolving data communications technologies, which are ________ or ________ depending on how one views them, are having dramatic effects on the ethical standards of conduct within our society.
A) invasive, pervasive
B) similar, different
C) active, interactive
D) small, large
Answer: A
Diff: 1 Page Ref: 9

21) If a business wants to be able to keep accurate records of its inventory, what should the business utilize?
A) Wireless technologies to be connected to the network all the time
B) More resources to keep track of what has been sold and what has been purchased
C) GPS (Global Positioning System)
D) RFID (Radio Frequency Identification)
Answer: D
Diff: 2 Page Ref: 9

22) What are the two main types of standards?
A) invasive or pervasive
B) TCP/IP and Ethernet
C) formal and informal
D) IPv4 and IPv6
Answer: C
Diff: 1 Page Ref: 9

23) Standards provide well-known and published ________ upon which a technology can be based.
A) guidelines
B) rules
C) policies
D) All of the above are correct
Answer: D
Diff: 2 Page Ref: 9

24) ________ standards are either proprietary or nonproprietary.
A) Formal
B) Non-formal
C) FCC (Federal Communications Commission)
D) De facto
Answer: D
Diff: 2 Page Ref: 9

25) A famous example of a de facto standard that later became a formal standard is ________.
A) Internet subnet mask
B) Internet Protocol (IP)
C) Ethernet protocol
D) Unicode
Answer: C
Diff: 3 Page Ref: 10

26) Ethernet was created by Xerox Corporation and later formalized by the Institute of Electrical and Electronics Engineers (IEEE) as what standard?
A) 801.2
B) 802.1
C) 802.11
D) 802.3
Answer: D
Diff: 3 Page Ref: 10

27) ISO is one of the standards-setting bodies. ISO stands for ________.
A) Internet Standardization Organization
B) International Standards Organization
C) International Systems Organizations
D) Internet Systems Organization
Answer: B
Diff: 1 Page Ref: 10

28) One of the major standards-setting body organizations is ANSI, which stands for ________.
A) American Native Standards Institute
B) American National Standards of Internet
C) American National Standards Institute
D) American Nation Systems Institute
Answer: C
Diff: 1 Page Ref: 10

29) The ISO attempts to create international technological compatibility by supporting and establishing worldwide ________.
A) standards
B) protocols
C) IP addresses
D) Ethernet protocol
Answer: A
Diff: 2 Page Ref: 10

30) The ________ defines many standards for both local area networks (LANs) and backbone networks.
A) ISO
B) ANSI
C) IEEE
D) FCC
Answer: C
Diff: 3 Page Ref: 10

31) The ________ is a nonprofit organization accredited by the American National Standards Institute to develop voluntary industry standards for a wide variety of telecommunications products.
A) IANA
B) IETF
C) FCC
D) TIA
Answer: D
Diff: 3 Page Ref: 10

32) The ________ attempts to create international technological compatibility by supporting and establishing worldwide standards in the field of information technology.
A) FCC
B) OSI
C) ISO
D) IEEE
Answer: C
Diff: 1 Page Ref: 10

33) ________ of a technology know that, by following standards, they will create a product of much greater appeal to their market of interest.
A) Network engineers
B) Software engineers
C) Managers
D) Developers
Answer: D
Diff: 2 Page Ref: 9

34) ________ of a technology appreciate standards because it makes for easier maintenance, upgrade, and troubleshooting of their technology infrastructures.
A) Managers
B) Developers
C) Help desk users
D) All of the above
Answer: A
Diff: 2 Page Ref: 9

35) The ________ is an open-member professional society, meaning you could join it if you wanted to. It is the closest the Internet has to an owning organization. It represents more than 100 countries.
A) OSI
B) ISO
C) ISOC
D) IETF
Answer: C
Diff: 3 Page Ref: 10

36) The ________ is an international community, consisting of researchers, vendors, and network designers. Its concern is with the evolution of the Internet's architecture and its efficient functioning.
A) IEEE
B) FCC
C) ANSI
D) IETF
Answer: D
Diff: 2 Page Ref: 10

37) The ________ is responsible for actions associated with, and the final specifications of, Internet standards.
A) IESG
B) FCC
C) ANSI
D) IETF
Answer: A
Diff: 2 Page Ref: 11

38) The Internet Architecture Board (IAB) provides strategic direction and guidance to the IESG and the ________.
A) IANA
B) FCC
C) ANSI
D) IETF
Answer: D
Diff: 2 Page Ref: 11

39) The IANA (Internet Assigned Numbers Authority) governs the assignment of IP ________.
A) standards
B) numbers
C) binary codes
D) All of the above
Answer: B
Diff: 2 Page Ref: 11

40) The ________ oversees and authorizes interstate and international electrical communication systems originating in the U.S.
A) IESG
B) FCC
C) ANSI
D) IETF
Answer: B
Diff: 2 Page Ref: 11

41) The ________ plays a major role in ensuring that the national telephone system operates effectively.
A) IESG
B) ISO
C) FCC
D) IETF
Answer: C
Diff: 1 Page Ref: 11

42) The ________ spearheaded the development of the Simple Network Management Protocol (SNMP) and reviews performance standards for bridges, routers, and router protocols.
A) ISO
B) IEEE
C) IETF
D) FCC
Answer: C
Diff: 3 Page Ref: 10

43) The ________ plays a fundamental role in the defining of standards for electrical and functional characteristics of interface equipment.
A) TIA
B) IEEE
C) IETF
D) FCC
Answer: A
Diff: 2 Page Ref: 10

44) _______'s membership list includes industry associations, consumer groups, governmental bodies, professional associations, and other interested parties.
A) ISO
B) IETF
C) IEEE
D) ANSI
Answer: D
Diff: 3 Page Ref: 10

45) The ________ has established standards that define data transmission over phone lines, e-mail and directory services, and transmission over public digital networks.
A) ISO
B) ITU-T
C) IEEE
D) ANSI
Answer: B
Diff: 3 Page Ref: 10

46) ________ determine the speed at which sending and receiving devices can communicate based on the capabilities of each device.
A) Protocols
B) Standards
C) IPv4s
D) IPv6s
Answer: A
Diff: 2 Page Ref: 11

1.2 True/False Questions

1) Networked data communications are not changing our world.
Answer: FALSE
Diff: 1 Page Ref: 2

2) In 720 B.C., the Greeks used homing pigeons to carry messages.
Answer: FALSE
Diff: 3 Page Ref: 2

3) Global Positioning System (GPS) provides instant messaging and assistance.
Answer: FALSE
Diff: 2 Page Ref: 2

4) The evolution of data communications can be divided into five phases.
Answer: TRUE
Diff: 1 Page Ref: 3

5) The evolution of data communications can be divided into six phases.
Answer: FALSE
Diff: 2 Page Ref: 3

6) Deregulation is one of the six evolution phases of data communications.
Answer: FALSE
Diff: 3 Page Ref: 3

7) Deregulation is not one of the five evolution phases of data communications.
Answer: FALSE
Diff: 1 Page Ref: 3

8) The evolution of the Internet came to existence in 1972.
Answer: FALSE
Diff: 2 Page Ref: 3

9) The Internet is one of the six evolution phases of data communications.
Answer: FALSE
Diff: 1 Page Ref: 3

10) The evolution of the Internet took place in 1990s.
Answer: TRUE
Diff: 2 Page Ref: 3

11) In the 1970s, computer technology began to transform our social, economic, and governmental infrastructures.
Answer: FALSE
Diff: 3 Page Ref: 3

12) Computer technology began to transform our social, economic, and governmental infrastructures in the 1960s.
Answer: TRUE
Diff: 1 Page Ref: 3

13) Mainframe computers are primarily used for storing small amounts of data.
Answer: FALSE
Diff: 3 Page Ref: 3

14) Mainframe computers were very large and expensive and used proprietary architectures that did not support cross-platform communications.
Answer: TRUE
Diff: 1 Page Ref: 3

15) A closed architecture technology does not permit competing technologies to directly interface or interact with it.
Answer: TRUE
Diff: 2 Page Ref: 3

16) Because they were large, expensive, and simple, mainframes were used mostly by governments, major research institutes, and large corporations.
Answer: FALSE
Diff: 1 Page Ref: 3

17) Because they were large, expensive, and complex, personal computers were used mostly by governments, major research institutes, and large corporations.
Answer: FALSE
Diff: 1 Page Ref: 3

18) The first data communications infrastructures used the existing circuit-based telephone system.
Answer: TRUE
Diff: 2 Page Ref: 3

19) In 1986, the U.S. Congress passed the Telecommunications Competition and Deregulation Act.
Answer: FALSE
Diff: 2 Page Ref: 4

20) In 1958, in response to the Soviet Union's launch of Sputnik, the U.S. Department of Defense established the Advanced Resource Projects Agency (ARPA).
Answer: FALSE
Diff: 3 Page Ref: 4

21) In 1968, in response to the Soviet Union's launch of Sputnik, the U.S. Department of Defense established the Advanced Research Projects Agency (ARPA).
Answer: FALSE
Diff: 1 Page Ref: 4

22) According to IMS Research, the total number of devices connected to the Internet was expected to exceed 15 billion as of August 2010.
Answer: FALSE
Diff: 2 Page Ref: 4

23) The Internet mostly in use today, especially in the U.S., is known as Internet Protocol version 4.
Answer: TRUE
Diff: 2 Page Ref: 5

24) IPv4 will ultimately be replaced with the new improved Internet, IPv9 (Internet Protocol version 9).
Answer: FALSE
Diff: 1 Page Ref: 5

25) A technology so commonly used that it is taken for granted within a society is referred to as a pervasive technology.
Answer: TRUE
Diff: 3 Page Ref: 5

26) A famous example of a commonly used pervasive technology in industrial countries is the cars we drive.
Answer: FALSE
Diff: 2 Page Ref: 5

27) The Internet, by way of the World Wide Web (WWW), has become an information repository to only social media data.
Answer: FALSE
Diff: 1 Page Ref: 6

28) Data communications is formally considered the main provider of telecommunications.
Answer: FALSE
Diff: 2 Page Ref: 6

29) In telecommunications the prefix "tele" comes from the Roman word for distant.
Answer: FALSE
Diff: 3 Page Ref: 6

30) "Data" might include graphic images, sound files, but no video elements.
Answer: FALSE
Diff: 2 Page Ref: 12

31) Regardless of the kind of data, data will ultimately be expressed in IP Addresses format so that computers can process it.
Answer: FALSE
Diff: 3 Page Ref: 6

32) The three questions that must be considered with regards to data communications are (1) how the data are received, (2) how accurate the data are once delivered, and (3) how accessible the data are to those who need to use it.
Answer: FALSE
Diff: 3 Page Ref: 7

33) A protocol is a set of rules that determine how data are delivered and received.
Answer: FALSE
Diff: 2 Page Ref: 7

34) A protocol is a set of rules that determine how something is performed or accomplished.
Answer: TRUE
Diff: 1 Page Ref: 7

35) RFID, which stands for Radio Format Identification, is a wireless technology used widely to tag a device for tracking and monitoring purposes.
Answer: FALSE
Diff: 3 Page Ref: 9

36) Formal standards are those standards that have been authorized by either an officially recognized body or by law and regulation.
Answer: TRUE
Diff: 3 Page Ref: 9

37) The TIA is a nonprofit organization accredited by the American National Standards Institute (ANSI) to develop voluntary industry standards for a wide variety of telecommunications products.
Answer: TRUE
Diff: 3 Page Ref: 10

1.3 Essay Questions

1) What are the evolution phases of data communications?
Answer:
1: Digitization in the 1960s
2: Growth of data communications in the 1970s
3: An era of deregulation in the 1980s
4: The Internet as a common tool in the 1990s
5: Pervasive computing in the 2000s
Diff: 3 Page Ref: 3

2) What does ARPA stand for, and what was the purpose of its establishment?
Answer: ARPA stands for Advanced Research Projects Agency. One of ARPA's primary missions was to find a way for computers to communicate with each other, regardless of the computers" manufacturers.
Diff: 2 Page Ref: 4

3) What is the current version of the Internet protocol? What are some of the benefits of the Internet protocol? What is the next and enhanced version of the Internet protocol?
Answer: The Internet mostly in use today, especially in the U.S., is known as version IPv4 (Internet Protocol version 4). When this version of the Internet was created, researchers had no way of knowing how wildly successful the Internet would become. Also, the types of data that IPv4 was designed to carry did not include relatively resource-intensive kinds of files such as those carrying video and sound. In the long run, for all of this to happen, IPv4 will ultimately be replaced with the new improved Internet, IPv6 (Internet Protocol version 6). This transition is taking place now. IPv6 is viewed by many technologists as a solution to the significant problems that IPv4 cannot address.
Diff: 3 Page Ref: 5

4) What is the main difference between Data Communications and Telecommunications? Where does the prefix "Tele" come from?
Answer: Data communications, as the name implies, is focused on the communication of data and information between computers and computer networks. Today, the term data encompasses a much broader range of elements, no longer consisting of just numbers and text. Data communications is formally considered as a subset of telecommunications, meaning that data communications is included within telecommunications, not the other way around. Even so, data communications covers a very large territory. Telecommunications includes many different types of communication besides data, such as voice and video, and includes telephony, telegraphy, and television. Therefore, telecommunications historically has supported other purposes beyond communications between computers and networks. The prefix "tele" comes from the Greek word for distant. In telecommunications, we are usually talking about great distances.
Diff: 2 Page Ref: 6

5) What is the main definition of protocol and for what is it used?
Answer: Protocol is a set of rules that determine how something is performed or accomplished. Many kinds of protocols rule our daily lives, some formal, some casual. When a customer goes into a bank to make a transaction, protocol states that the customer politely wait in line until it is his or her turn to speak with a teller.
Diff: 1 Page Ref: 7

6) In data communications, protocols must possess four key characteristics in order for communications to successfully and effectively occur. What are these four key characteristics?
Answer:
1. First, an agreement, or protocol, must specify how the data are to be packaged, or formatted, so that they can be sent between sending and receiving devices.
2. The ability of the communicating devices to understand the formatting protocols being used.
3. A third characteristic that data communication protocols should address is the speed of the communication
4. When two devices need to communicate, one of the devices may not be available for a variety of reasons: hardware failure, a downed communication link, system repair, or software upgrading.
Diff: 3 Page Ref: 7 and 8

7) What does RFID stand for? For what is RFID used?
Answer: RFID stands for Radio Frequency Identification. RFID help businesses to track and monitor inventory. With the use of RFID, businesses can keep accurate records of inventory. Businesses will also know what is in their warehouses or selling from the shelves of retailers. Businesses will have a better understanding of what items should be increased, or decreased, in terms of production.
Diff: 1 Page Ref: 9

8) What are the main differences between protocols and standards?
Answer: Protocols are the rules that determine how devices communicate. Standards define the establishment of the essential rules, functionalities, and operations a protocol must fulfill.
Diff: 2 Page Ref: 9

9) Describe two of the Standards-setting organizational bodies.
Answer: The ITU-T concerns itself with international telecommunications issues. The ITU-T's particular areas of interest are phone and data systems. The ITU-T has established standards that define data transmission over phone lines, e-mail and directory services, and transmission over public digital networks.

ANSI represents the United States on the ISO. However, ANSI does not have a formal affiliation with the Federal Government; it is a nonprofit, private corporation. ANSI's membership list includes industry associations, consumer groups, governmental bodies, professional associations, and other interested parties. ANSI is the principal standards-setting body in the United States.
The IEEE defines many standards for both local area networks (LANs) and backbone networks (BNs). Emphasizing electronics and electrical engineering, the IEEE is the world's largest professional engineering society. The IEEE is playing a critical part in establishing new wireless communication standards. (See this chapter's "Topic in Focus" to find out more about the IEEE.)
The TIA is a nonprofit organization accredited by the American National Standards Institute (ANSI) to develop voluntary industry standards for a wide variety of telecommunications products. The TIA plays a fundamental role in the defining of standards for electrical and functional characteristics of interface equipment.
Diff: 3 Page Ref: 10

10) What is the main purpose of the ISO (International Standards Organization)?
Answer: The ISO is an international body of voluntary organizations with great influence in the field of information technology. The ISO attempts to create international technological compatibility by supporting and establishing worldwide standards.
Diff: 1 Page Ref: 10

• uestion 1
1 out of 1 points
| | |
| |The FCC and state public utility commissions do NOT regulate which type of networks? | | | |
| |Answers: | | | |
| |WAN | | | |
| | | | | |
| | | | | |
| |BN | | | |
| | | | | |
| | | | | |
| |MAN | | | |
| | | | | |
| | | | | |
| |LAN | | | |
| | | | | |

• Question 2
1 out of 1 points
| | |
| |Which layer in an OSI data communication networking model ensures that the entire message sent from a sender to a receiver has been | | | |
| |delivered? | | | |
| |Answers: | | | |
| |session layer | | | |
| | | | | |
| | | | | |
| |presentation layer | | | |
| | | | | |
| | | | | |
| |transport layer | | | |
| | | | | |
| | | | | |
| |network layer | | | |
| | | | | |

• Question 3
0 out of 1 points
| | |
| |The networks of the enterprise are typically connected through which kind of network? | | | |
| |Answers: | | | |
| |BN | | | |
| | | | | |
| | | | | |
| |WAN | | | |
| | | | | |
| | | | | |
| |LAN | | | |
| | | | | |
| | | | | |
| |MAN | | | |
| | | | | |

• Question 4
0 out of 1 points
| | |
| |The top four "end-to-end" layers under the OSI model are: | | | |
| |Answers: | | | |
| |link, letter, presenting, and final | | | |
| | | | | |
| | | | | |
| |interior, exterior, anterior, and posterior | | | |
| | | | | |
| | | | | |
| |transfer, transmit, user, and end | | | |
| | | | | |
| | | | | |
| |application, presentation, session, and transport | | | |
| | | | | |

• Question 5
1 out of 1 points
| | |
| |When data travels through the layers of a networking model, it is most akin to ________. | | | |
| |Answers: | | | |
| |an envelope that gets stamped along the way | | | |
| | | | | |
| | | | | |
| |a book that has chapters added | | | |
| | | | | |
| | | | | |
| |an onion that loses its layers | | | |
| | | | | |
| | | | | |
| |a roof that has shingles added | | | |
| | | | | |

• Question 6
1 out of 1 points
| | |
| |Three key services provided at the application layer include: (1) synchronizing the services between a user application and the | | | |
| |protocol(s) it may use, (2) ensuring that necessary resources required by an application service are available, and (3) ________. | | | |
| |Answers: | | | |
| |making sure that end users are receptive | | | |
| | | | | |
| | | | | |
| |making sure that the application is licensed | | | |
| | | | | |
| | | | | |
| |making sure that email is properly set up | | | |
| | | | | |
| | | | | |
| |making sure that the correct communication protocol or service is available to the application | | | |
| | | | | |

• Question 7
1 out of 1 points
| | |
| |In order to get a computer's data from point A to point B, an ________ must be used. | | | |
| |Answers: | | | |
| |ARP | | | |
| | | | | |
| | | | | |
| |infrastructure | | | |
| | | | | |
| | | | | |
| |Interpol | | | |
| | | | | |
| | | | | |
| |Internet subnet mask | | | |
| | | | | |

• Question 8
1 out of 1 points
| | |
| |How do OSI layers help a document in a Chicago workstation get to a workstation in Denver? | | | |
| |Answers: | | | |
| |OSI provides the authority for the file transfer. | | | |
| | | | | |
| | | | | |
| |The layers ensure confidentiality as the file is sent. | | | |
| | | | | |
| | | | | |
| |The layers provide the cloud that will allow the file transfer. | | | |
| | | | | |
| | | | | |
| |The layer protocol takes over at each step, down the layers, and each layer envelopes and adds its own stamp or header. | | | |
| | | | | |

• Question 9
1 out of 1 points
| | |
| |A layered architecture is ________ to a data communication network model. | | | |
| |Answers: | | | |
| |insignificant | | | |
| | | | | |
| | | | | |
| |advantageous | | | |
| | | | | |
| | | | | |
| |incompatible | | | |
| | | | | |
| | | | | |
| |incongruent | | | |
| | | | | |

• Question 10
1 out of 1 points
| | |
| |Data have to be encoded into some ________ form so that the data can be used by computer systems. | | | |
| |Answers: | | | |
| |secondary | | | |
| | | | | |
| | | | | |
| |tertiary | | | |
| | | | | |
| | | | | |
| |bipolar | | | |
| | | | | |
| | | | | |
| |binary | | | |
| | | | | |

• Question 11
1 out of 1 points
| | |
| |Networks have both physical and logical components. These include ________ and ________. | | | |
| |Answers: | | | |
| |RAM, CPU | | | |
| | | | | |
| | | | | |
| |hard drives, external drives | | | |
| | | | | |
| | | | | |
| |hosts, external sites | | | |
| | | | | |
| | | | | |
| |hardware, software | | | |
| | | | | |

• Question 12
0 out of 1 points
| | |
| |The distinction between where one category of network begins and another ends is: | | | |
| |Answers: | | | |
| |crystal clear | | | |
| | | | | |
| | | | | |
| |sometimes blurry | | | |
| | | | | |
| | | | | |
| |impossible | | | |
| | | | | |
| | | | | |
| |never an issue | | | |
| | | | | |

• Question 13
1 out of 1 points
| | |
| |What is the best description of a "cloud" in networking terms? | | | |
| |Answers: | | | |
| |the inner workings of the infrastructure, the details that are hidden from the user | | | |
| | | | | |
| | | | | |
| |the organization that owns a network | | | |
| | | | | |
| | | | | |
| |a fluffy, beautiful object floating in a blue sky | | | |
| | | | | |
| | | | | |
| |the parent company of a networking company | | | |
| | | | | |

• Question 14
0 out of 1 points
| | |
| |Which of the following will commonly use circuits provided by common carriers? | | | |
| |Answers: | | | |
| |MAN | | | |
| | | | | |
| | | | | |
| |WAN | | | |
| | | | | |
| | | | | |
| |LAN | | | |
| | | | | |
| | | | | |
| |BN | | | |
| | | | | |

• Question 15
1 out of 1 points
| | |
| |Which layer in an OSI data communication networking model is responsible for establishing, maintaining, and terminating communications | | | |
| |running between processes and applications across the network? | | | |
| |Answers: | | | |
| |application layer | | | |
| | | | | |
| | | | | |
| |session layer | | | |
| | | | | |
| | | | | |
| |presentation layer | | | |
| | | | | |
| | | | | |
| |network layer | | | |
| | | | | |

• Question 16
1 out of 1 points
| | |
| |Which statement is most accurate? | | | |
| |Answers: | | | |
| |Many MAN and WAN infrastructure users simply lease the right to use the infrastructure. | | | |
| | | | | |
| | | | | |
| |MAN and WAN infrastructures are always owned by end-users. | | | |
| | | | | |
| | | | | |
| |MAN and WAN infrastructure users are prohibited from leasing such infrastructures. | | | |
| | | | | |
| | | | | |
| |LAN infrastructure users always lease such infrastructures. | | | |
| | | | | |

• Question 17
1 out of 1 points
| | |
| |The physical layer of the OSI data communication networking model is responsible for the ________ of bits, line configuration, physical| | | |
| |topology, and the transmission mode. | | | |
| |Answers: | | | |
| |eradication | | | |
| | | | | |
| | | | | |
| |coordination | | | |
| | | | | |
| | | | | |
| |conjunction | | | |
| | | | | |
| | | | | |
| |synchronization | | | |
| | | | | |

• Question 18
0 out of 1 points
| | |
| |A network can fall into one of four categories. What are the categories? | | | |
| |Answers: | | | |
| |local area network; backbone network; metropolitan area network; wide area network | | | |
| | | | | |
| | | | | |
| |LAN, BN, MAN, WAN | | | |
| | | | | |
| | | | | |
| |either local area network; backbone network; metropolitan area network; wide area network or LAN, BN, MAN, WAN | | | |
| | | | | |
| | | | | |
| |None of these | | | |
| | | | | |

• Question 19
1 out of 1 points
| | |
| |Some of the services provided at the application layer of the OSI model might include: | | | |
| |Answers: | | | |
| |e-mail | | | |
| | | | | |
| | | | | |
| |remote file access and transfer | | | |
| | | | | |
| | | | | |
| |e-printing services | | | |
| | | | | |
| | | | | |
| |All of these | | | |
| | | | | |

• Question 20
0 out of 1 points
| | |
| |When was the TCP/IP model developed? | | | |
| |Answers: | | | |
| |at the same time as the OSI model | | | |
| | | | | |
| | | | | |
| |after the OSI model | | | |
| | | | | |
| | | | | |
| |before the OSI model | | | |
| | | | | |
| | | | | |
| |by accident when the OSI model was being developed | | | |
| | | | | |

• Question 21
1 out of 1 points
| | |
| |The ________ model has become the model of choice throughout the world not only for wide area networks (WANs), but also for | | | |
| |metropolitan area networks (MANs), local area networks (LANs) and backbone networks (BNs). | | | |
| |Answers: | | | |
| |TCP/IP | | | |
| | | | | |
| | | | | |
| |EMP | | | |
| | | | | |
| | | | | |
| |OSI | | | |
| | | | | |
| | | | | |
| |R2D2 | | | |
| | | | | |

• Question 22
1 out of 1 points
| | |
| |Open standards are: | | | |
| |Answers: | | | |
| |available for public comment, review, and varying implementation | | | |
| | | | | |
| | | | | |
| |unavailable to the public | | | |
| | | | | |
| | | | | |
| |subject to Freedom of Information Act requests | | | |
| | | | | |
| | | | | |
| |a thing of the past | | | |
| | | | | |

• Question 23
0 out of 1 points
| | |
| |Data communication networking models that have won wide acceptance include: | | | |
| |Answers: | | | |
| |OSI | | | |
| | | | | |
| | | | | |
| |TCP/IP | | | |
| | | | | |
| | | | | |
| |All of these | | | |
| | | | | |
| | | | | |
| |None of these | | | |
| | | | | |

• Question 24
1 out of 1 points
| | |
| |In the 7-layered OSI model of architecture, layer 3 would be required to communicate with which of the following layers? | | | |
| |Answers: | | | |
| |1, 2, 3 only | | | |
| | | | | |
| | | | | |
| |1, 2 only | | | |
| | | | | |
| | | | | |
| |2, 4 only | | | |
| | | | | |
| | | | | |
| |4 and above | | | |
| | | | | |

• Question 25
0 out of 1 points
| | |
| |Which of the following statements is the most accurate? | | | |
| |Answers: | | | |
| |An organization can use a LAN to cover greater distances at higher data rates than those offered by a MAN. | | | |
| | | | | |
| | | | | |
| |A LAN can be used to connect BNs and WANs. | | | |
| | | | | |
| | | | | |
| |An organization may find, if justified by transmission-volume needs, that having a private MAN may be less expensive than leasing these| | | |
| |services from a local telecommunications company. | | | |
| | | | | |
| | | | | |
| |A MAN is never subject to federal and state regulations. | | | |
| | | | | |

• Question 26
1 out of 1 points
| | |
| |ARP stands for: | | | |
| |Answers: | | | |
| |Address Resolution Protocol | | | |
| | | | | |
| | | | | |
| |Advanced Reconnection Procedure | | | |
| | | | | |
| | | | | |
| |Acquiring Resonance Pattern | | | |
| | | | | |
| | | | | |
| |Associative Receiving Participle | | | |
| | | | | |

• Question 27
1 out of 1 points
| | |
| |IGMP stands for: | | | |
| |Answers: | | | |
| |Indeterminate Group Management Processes | | | |
| | | | | |
| | | | | |
| |International Group Management Protocol | | | |
| | | | | |
| | | | | |
| |Internet Group Message Protocol | | | |
| | | | | |
| | | | | |
| |Internet Generic Message Protocol | | | |
| | | | | |

• Question 28
1 out of 1 points
| | |
| |What are the seven layers of the Open Systems Interconnection (OSI) model? | | | |
| |Answers: | | | |
| |Readiness, power, venue, markup, transmission, reception, end | | | |
| | | | | |
| | | | | |
| |Start, process, link, adapt, measure, synchronize, end | | | |
| | | | | |
| | | | | |
| |Physical, data link, network, transport, application, presentation, session | | | |
| | | | | |
| | | | | |
| |Identification, reaction, initiation, transmittal, analysis, synergization, conclusion | | | |
| | | | | |

• Question 29
1 out of 1 points
| | |
| |The infrastructures that create and support a WAN are ________ regulated. | | | |
| |Answers: | | | |
| |heavily | | | |
| | | | | |
| | | | | |
| |never | | | |
| | | | | |
| | | | | |
| |rarely | | | |
| | | | | |
| | | | | |
| |sometimes | | | |
| | | | | |

• Question 30
1 out of 1 points
| | |
| |Some of the questions a networking technologist might ask when setting up a network would include: | | | |
| |Answers: | | | |
| |What is the purpose of the network? What services will this network be expected to provide? | | | |
| | | | | |
| | | | | |
| |What types of connectivity, 10 people or 100,000, are required? What are the physical dimensions the network? | | | |
| | | | | |
| | | | | |
| |Is the network limited to the size of a room or the expanse of a country? What type of business and user applications will this network| | | |
| |have to support? | | | |
| | | | | |
| | | | | |
| |All of these. | | | |
| | | | | |

• Question 31
1 out of 1 points
| | |
| |Which layer in an OSI data communication networking model ensures that data passed up to the application layer is in a format | | | |
| |understandable to that layer? | | | |
| |Answers: | | | |
| |application layer | | | |
| | | | | |
| | | | | |
| |presentation layer | | | |
| | | | | |
| | | | | |
| |transport layer | | | |
| | | | | |
| | | | | |
| |network layer | | | |
| | | | | |

• Question 32
1 out of 1 points
| | |
| |The ________ layer of the OSI data communication networking model takes unpackaged bit stream data arriving from the physical layer and| | | |
| |packages the bits into units called frames and then attaches a physical address to each frame. | | | |
| |Answers: | | | |
| |data link | | | |
| | | | | |
| | | | | |
| |beta link | | | |
| | | | | |
| | | | | |
| |transport link | | | |
| | | | | |
| | | | | |
| |communication link | | | |
| | | | | |

• Question 33
1 out of 1 points
| | |
| |IP is used at the network layer to send units of data called ________ from one network to the next. | | | |
| |Answers: | | | |
| |fledglings | | | |
| | | | | |
| | | | | |
| |datagrams | | | |
| | | | | |
| | | | | |
| |widgets | | | |
| | | | | |
| | | | | |
| |netgrams | | | |
| | | | | |

• Question 34
1 out of 1 points
| | |
| |As in the OSI model, the data link layer in the TCP/IP model is responsible for moving data from one ________ to the next in the | | | |
| |network path from the sender to the receiver. | | | |
| |Answers: | | | |
| |database | | | |
| | | | | |
| | | | | |
| |host | | | |
| | | | | |
| | | | | |
| |datagram | | | |
| | | | | |
| | | | | |
| |laptop | | | |
| | | | | |

• Question 35
1 out of 1 points
| | |
| |A significant difference between TCP/IP and OSI is that: | | | |
| |Answers: | | | |
| |several of the protocols associated with TCP/IP are relatively independent of the layer that they are generally associated with | | | |
| |whereas, with OSI, protocol functions are dependent to the layer they are associated with | | | |
| | | | | |
| | | | | |
| |several of the protocols associated with OSI are relatively independent of the layer that they are generally associated with whereas, | | | |
| |with TCP/IP protocol functions are dependent to the layer they are associated with | | | |
| | | | | |
| | | | | |
| |both several of the protocols associated with TCP/IP are relatively independent of the layer that they are generally associated with | | | |
| |whereas, with OSI, protocol functions are dependent to the layer they are associated with and several of the protocols associated with | | | |
| |OSI are relatively independent of the layer that they are generally associated with whereas, with TCP/IP protocol functions are | | | |
| |dependent to the layer they are associated with | | | |
| | | | | |
| | | | | |
| |neither several of the protocols associated with TCP/IP are relatively independent of the layer that they are generally associated with| | | |
| |whereas, with OSI, protocol functions are dependent to the layer they are associated with nor several of the protocols associated with | | | |
| |OSI are relatively independent of the layer that they are generally associated with whereas, with TCP/IP protocol functions are | | | |
| |dependent to the layer they are associated with | | | |
| | | | | |

• Question 36
1 out of 1 points
| | |
| |What is one thing that the TCP/IP model and the OSI model have in common? | | | |
| |Answers: | | | |
| |They are both layered models. | | | |
| | | | | |
| | | | | |
| |They both have lateral sub-models. | | | |
| | | | | |
| | | | | |
| |They both have identical layers. | | | |
| | | | | |
| | | | | |
| |They were both created by OSHA. | | | |
| | | | | |

• Question 37
1 out of 1 points
| | |
| |RARP stands for: | | | |
| |Answers: | | | |
| |Reverse Address Resolution Protocol | | | |
| | | | | |
| | | | | |
| |Rearing Adverse Resolution Practice | | | |
| | | | | |
| | | | | |
| |Revolving Address Resolution Protocol | | | |
| | | | | |
| | | | | |
| |Resolution And Reversion Protocol | | | |
| | | | | |

• Question 38
1 out of 1 points
| | |
| |Organizations that have more than one LAN might be tempted to ________. | | | |
| |Answers: | | | |
| |connect the networks through a backbone network | | | |
| | | | | |
| | | | | |
| |use a backbone network to allow the LAN networks to communicate with each other | | | |
| | | | | |
| | | | | |
| |connect the networks to share resources | | | |
| | | | | |
| | | | | |
| |All of these | | | |
| | | | | |

• Question 39
1 out of 1 points
| | |
| |Networking models are ________. | | | |
| |Answers: | | | |
| |concrete | | | |
| | | | | |
| | | | | |
| |conceptual | | | |
| | | | | |
| | | | | |
| |unable to be duplicated | | | |
| | | | | |
| | | | | |
| |not able to be modified | | | |
| | | | | |

• Question 40
1 out of 1 points
| | |
| |Sprint, MCI, AT&T and others are all examples of what kind of organizations? | | | |
| |Answers: | | | |
| |common law companies | | | |
| | | | | |
| | | | | |
| |common networkers | | | |
| | | | | |
| | | | | |
| |common telecommuters | | | |
| | | | | |
| | | | | |
| |common carriers | | | |
| | | | | |

• Question 41
0 out of 1 points
| | |
| |If an employee used a file transfer protocol program to send a large report file, the user interface in the file transfer program would| | | |
| |serve as the ________ layer that permits two people to exchange the data file over the network. | | | |
| |Answers: | | | |
| |presentation | | | |
| | | | | |
| | | | | |
| |transfer | | | |
| | | | | |
| | | | | |
| |application | | | |
| | | | | |
| | | | | |
| |session | | | |
| | | | | |

• Question 42
1 out of 1 points
| | |
| |The three lower layers under the OSI model are: | | | |
| |Answers: | | | |
| |application, presentation, session | | | |
| | | | | |
| | | | | |
| |network, data link, physical | | | |
| | | | | |
| | | | | |
| |transfer, transmit, user | | | |
| | | | | |
| | | | | |
| |link, presenting, final | | | |
| | | | | |

• Question 43
1 out of 1 points
| | |
| |A networking model is akin to a(n): | | | |
| |Answers: | | | |
| |architectural blueprint | | | |
| | | | | |
| | | | | |
| |compass rose | | | |
| | | | | |
| | | | | |
| |divining stick | | | |
| | | | | |
| | | | | |
| |None of these | | | |
| | | | | |

• Question 44
1 out of 1 points
| | |
| |Physical and logical components within the network work with each other based on standards and ________. | | | |
| |Answers: | | | |
| |protocols | | | |
| | | | | |
| | | | | |
| |projects | | | |
| | | | | |
| | | | | |
| |guesses | | | |
| | | | | |
| | | | | |
| |projections | | | |
| | | | | |

• Question 45
1 out of 1 points
| | |
| |IP stands for: | | | |
| |Answers: | | | |
| |Internet productivity | | | |
| | | | | |
| | | | | |
| |International protocol | | | |
| | | | | |
| | | | | |
| |Intransient properties | | | |
| | | | | |
| | | | | |
| |Internet protocol | | | |
| | | | | |

• Question 46
1 out of 1 points
| | |
| |One governmental body that sets forth building regulations and safety standards is: | | | |
| |Answers: | | | |
| |FDIC | | | |
| | | | | |
| | | | | |
| |OSHA | | | |
| | | | | |
| | | | | |
| |OSBA | | | |
| | | | | |
| | | | | |
| |FDCPA | | | |
| | | | | |

• Question 47
1 out of 1 points
| | |
| |ICMP stands for: | | | |
| |Answers: | | | |
| |Internet Control Message Protocol | | | |
| | | | | |
| | | | | |
| |Internal Control Mechanism Procedures | | | |
| | | | | |
| | | | | |
| |Indeterminate Control Messaging Procedures | | | |
| | | | | |
| | | | | |
| |Internal Climate Message Protocol | | | |
| | | | | |

• Question 48
1 out of 1 points
| | |
| |Above and beyond their standards and protocols, networks have another dimension that describes how they function. This extra dimension | | | |
| |is the ________ upon which the network is based. | | | |
| |Answers: | | | |
| |logical component | | | |
| | | | | |
| | | | | |
| |standard procedure | | | |
| | | | | |
| | | | | |
| |networking model | | | |
| | | | | |
| | | | | |
| |None of these | | | |
| | | | | |

• Question 49
1 out of 1 points
| | |
| |Which of the following statements is the most accurate? | | | |
| |Answers: | | | |
| |A LAN would never be found in a work environment. | | | |
| | | | | |
| | | | | |
| |A LAN is always configured in the same way. | | | |
| | | | | |
| | | | | |
| |A LAN is the same thing as a BN. | | | |
| | | | | |
| | | | | |
| |A LAN may include printers and routers. | | | |
| | | | | |

• Question 50
1 out of 1 points
| | |
| |The Open Systems Interconnection (OSI) model has ________ layer(s). | | | |
| |Answers: | | | |
| |one | | | |
| | | | | |
| | | | | |
| |three | | | |
| | | | | |
| | | | | |
| |five | | | |
| | | | | |
| | | | | |
| |seven | | | |
| | | | | |

Similar Documents

Premium Essay

Business Management

...Navigation Feature-rich Get to know our Authors and Editors Why Publish with SAGE ? World’s LEADING Publisher and home and editors Societies authors Professional Academic LEADING Publisher Natural World’s Societies THE and LEADING Publisher Natural authors Societies Independent home editors THE Professional Natural Societies Independent authors Societies and Societies editors THE LEADING home editors Natural editors Professional Independent Academic and authors Academic Independent Publisher Academic Societies and authors Academic THE World’s THE editors Academic THE Natural LEADING THE Natural LEADING home Natural authors Natural editors authors home World’s authors THE editors authors LEADING Publisher World’s LEADING authors World’s Natural Academic editors World’s home Natural and Independent authors World’s Publisher authors World’s home Natural home LEADING Academic Academic LEADING editors Natural and Publisher editors World’s authors home Academic Professional authors Independent home LEADING Academic World’s and authors home and Academic Professionalauthors World’s editors THE LEADING Publisher authors Independent home editors Natural Academic Academic THE Natural Societies LEADING World’s Professional Academic LEADING Publisher World’s editors Independent Publisher and Natural home Professional Publisher Academic World’s home Natural authors home editors editors Natural Independent...

Words: 63606 - Pages: 255

Premium Essay

Mass Media

...Media History Contents 1 Introduction 1.1 Mass media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.1 1.1.2 1.1.3 1.1.4 1.1.5 1.1.6 1.1.7 1.1.8 1.1.9 Issues with definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Forms of mass media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Purposes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Professions involving mass media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Influence and sociology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ethical issues and criticism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Future . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1 1 2 6 6 7 8 10 10 10 10 11 11 12 12 12 12 16 16 17 17 17 17 17 17 18 19 20 21 21 21 1.1.10 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.11 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.12 Further reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.13 External links . . . . . . . . ....

Words: 146891 - Pages: 588

Premium Essay

Something

...Innovative Business Practices Innovative Business Practices: Prevailing a Turbulent Era Edited by Demetris Vrontis and Alkis Thrassou Innovative Business Practices: Prevailing a Turbulent Era, Edited by Demetris Vrontis and Alkis Thrassou This book first published 2013 Cambridge Scholars Publishing 12 Back Chapman Street, Newcastle upon Tyne, NE6 2XX, UK British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library Copyright © 2013 by Demetris Vrontis and Alkis Thrassou and contributors All rights for this book reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owner. ISBN (10): 1-4438-4604-X, ISBN (13): 978-1-4438-4604-2 TABLE OF CONTENTS Chapter One ................................................................................................. 1 Knowledge Hybridization: An Innovative Business Practices to Overcome the Limits of the Top-Down Transfers within a Multinational Corporation Hela Chebbi, Dorra Yahiaoui, Demetris Vrontis and Alkis Thrassou Chapter Two .............................................................................................. 17 Rethinking Talent Management in Organizations: Towards a Boundary-less Model Carrie Foster, Neil Moore and Peter Stokes Chapter Three .......

Words: 128975 - Pages: 516

Premium Essay

Robins & Robins Sues Casings, Inc.,

...organizational requirement to conform business practices to both the law and best ethical practices, apply appropriate ethical theories to shape a business decision. | I | Given specified circumstances of a business decision to expand to international markets, determine what international legal requirements or regulatory controls apply. | Topics for This Week's Discussion * Introduce yourself to your professor and the rest of the class. (not graded) * Thread over TCO A/I (graded) * Ethics and Patent Rights Post 9/11 (graded) * Q & A Forum for your questions and comments (not graded) | | There is a drop down arrow next to the "Select a Topic" box.  Click on this arrow to select topics for discussion. | ------------------------------------------------- Top of Form Select a Topic:       Bottom of Form The World Bank Situation (graded) | Class, please read Chapter 2, problem 5 from the Jennings text, p. 72. This week, we will discuss the Wolfowitz situation at the World Bank. Consider the questions at the end of the problem as you make comments in the threads this week. What are the ethics here? Was Wolfowitz trying to do the right thing? Does that make a difference ethically? Throughout the week, I will bring in further questions. Be sure to read the lecture and the international ethics article stated in your reading for the week as well. | Collapse All |    Show Options | sort by: response | author | date | read | unread ------------------------------------------------- ...

Words: 201281 - Pages: 806

Premium Essay

Global and Transnational Business: Strategy and Management

...Global and Transnational Business: Strategy and Management Second Edition Global and Transnational Business: Strategy and Management Second Edition George Stonehouse Northumbria University David Campbell University of Newcastle-upon-Tyne Jim Hamill University of Strathclyde Tony Purdie Northumbria University Copyright # 2004 John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England Telephone (þ44) 1243 779777 Email (for orders and customer service enquiries): cs-books@wiley.co.uk Visit our Home Page on www.wileyeurope.com or www.wiley.com All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except under the terms of the Copyright, Designs and Patents Act 1988 or under the terms of a licence issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road, London W1T 4LP, UK, without the permission in writing of the Publisher. Requests to the Publisher should be addressed to the Permissions Department, John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England, or emailed to permreq@wiley.co.uk, or faxed to (þ44) 1243 770620. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold on the understanding that the Publisher is not engaged in rendering professional services...

Words: 155276 - Pages: 622

Premium Essay

Ccscs

...7 Corporations in the Modern Era The Commercial Transformation of Material Life and Culture I hope we shall . . . crush in [its] birth the aristocracy of our monied corporations which dare already to challenge our government to a trial of strength and bid defiance to the laws of our country. —Thomas Jefferson (letter to Tom Logan, 1816) J 1 ustice John Paul Stevens of the U.S. Supreme Court cited the third president of the United States in his strong dissent to the majority’s 2010 decision allowing corporations unlimited spending on behalf of political candidates.1 Quoting the court’s earlier McConnell decision, Stevens wrote, “We have repeatedly sustained legislation aimed at ‘the corrosive and distorting effects of immense aggregations of wealth that are accumulated with Jefferson’s animus may seem curious in light of the history of British corporations that financed the settling of the first North American colonies and, as discussed in this chapter, are often credited with providing the model for representative government adopted by the framers of the U.S. Constitution (Tuitt 2006). 280 Corporations in the Modern Era——281 the help of the corporate form.’” The court’s decision, Justice Stevens continued, “will undoubtedly cripple the ability of ordinary citizens, Congress and the States to adopt even limited measures to protect against corporate domination of the electoral process.” The essence of Justice Steven’s dissent in the Citizens United v. Federal...

Words: 22537 - Pages: 91

Free Essay

Ihrm

...M A G A Z I N E FA L L 2 0 0 2 Volume 20 Number 2 SPANNING THE GLOBE Duke Leads the Way in International Law Teaching and Scholarship inside plus Duke admits smaller, exceptionally well-qualified class Duke’s Global Capital Markets Center to launch new Directors’ Education Institute from the dean Dear Alumni and Friends, It is not possible, these days, for a top law school to be anything other than an international one. At Duke Law, we no longer think of “international” as a separate category. Virtually everything we do has some international dimension, whether it concerns international treaties and protocols, commercial transactions across national borders, international child custody disputes, criminal behavior that violates international human rights law, international sports competitions, global environmental regulation, international terrorism, or any number of other topics. And, of course, there is little that we do at Duke that does not involve scholars and students from other countries, who are entirely integrated with U.S. scholars and students. Students enrolled in our joint JD/LLM program in international and comparative law receive an in-depth education in both the public and private aspects of international and comparative law, enriched by the ubiquitous presence of foreign students; likewise, the foreign lawyers who enroll in our one-year LLM program in American law enroll in the same courses, attend the same conferences...

Words: 58370 - Pages: 234

Free Essay

Spanning Globe

...M A G A Z I N E FA L L 2 0 0 2 Volume 20 Number 2 SPANNING THE GLOBE Duke Leads the Way in International Law Teaching and Scholarship inside plus Duke admits smaller, exceptionally well-qualified class Duke’s Global Capital Markets Center to launch new Directors’ Education Institute from the dean Dear Alumni and Friends, It is not possible, these days, for a top law school to be anything other than an international one. At Duke Law, we no longer think of “international” as a separate category. Virtually everything we do has some international dimension, whether it concerns international treaties and protocols, commercial transactions across national borders, international child custody disputes, criminal behavior that violates international human rights law, international sports competitions, global environmental regulation, international terrorism, or any number of other topics. And, of course, there is little that we do at Duke that does not involve scholars and students from other countries, who are entirely integrated with U.S. scholars and students. Students enrolled in our joint JD/LLM program in international and comparative law receive an in-depth education in both the public and private aspects of international and comparative law, enriched by the ubiquitous presence of foreign students; likewise, the foreign lawyers who enroll in our one-year LLM program in American law enroll in the same courses, attend the same conferences...

Words: 58047 - Pages: 233

Premium Essay

A Guide to Forensic Accounting Investigation

...any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400, fax 978-646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, 201-748-6011, fax 201-748-6008, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your...

Words: 246885 - Pages: 988

Premium Essay

Wns Hand Book123

...Student Handbook 2012 WELCOME TO WAIKATO Welcome to the University of Waikato. I hope you make the most of your time here and the opportunities that will present themselves during the course of your study. You have come to an excellent university that is ranked top in 10 subjects under the Government’s Performance Based Research Fund. We are also internationally connected; we have research connections and student exchanges with some of the world’s top universities. I urge you to consider taking part in these while you are with us. Here at the University of Waikato, you will be taught by lecturers who are leaders in their fields of research and who win national teaching awards. We are proud of our academic quality and the fact that we turn out sought-after graduates who go on to take up important roles in all parts of the world. You will already have noticed our beautiful campus which is set in 68 hectares of gardens, green space and lakes. At the heart of it all is the new Student Centre, which was completed in 2011. With its accessible areas, Library services and multitude of facilities, it is a place for students to study or just gather together and we are very proud of this building. In 2011 we celebrated 10 years of another important building, the Gallagher Academy of Performing Arts. This world-class facility was the vision of a group of driven Waikato people. It quickly became a focal point in the campus and continues to be an important venue for the performing...

Words: 126279 - Pages: 506

Free Essay

Business Process Management

...University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbruecken, Germany Richard Hull Jan Mendling Stefan Tai (Eds.) Business Process Management 8th International Conference, BPM 2010 Hoboken, NJ, USA, September 13-16, 2010 Proceedings 13 Volume Editors Richard Hull IBM Research, Thomas J. Watson Research Center 19 Skyline Drive, Hawthorne, NY 10532, USA E-mail: hull@us.ibm.com Jan Mendling Humboldt-Universität zu Berlin, Institut für Wirtschaftsinformatik Unter den Linden 6, 10099 Berlin, Germany E-mail: contact@mendling.com Stefan Tai Karlsruhe Institute of Technology (KIT) Englerstraße 11, Gebäude 11.40, 76131 Karlsruhe, Germany E-mail: stefan.tai@kit.edu Library of Congress Control Number: 2010933361 CR Subject Classification (1998): D.2, F.3, D.3, D.1, D.2.4, F.2 LNCS Sublibrary: SL 3 – Information Systems and Application, incl. Internet/Web and...

Words: 147474 - Pages: 590

Free Essay

Organization

...cover next page > title author publisher isbn10 | asin print isbn13 ebook isbn13 language subject publication date lcc ddc subject : : : : : : : : : : : cover next page > < previous page page_i next page > Page i 1100 Words You Need to Know Fourth Edition Murray Bromberg Principal Emeritus Andrew Jackson High School, Queens, New York Melvin Gordon Reading Specialist New York City Schools . . . Invest fifteen minutes a day for forty-six weeks in order to master 920 new words and almost 200 useful idioms < previous page page_i next page > < previous page page_ii next page > Page ii © Copyright 2000 by Barron's Educational Series, Inc. Prior edition © Copyright 1993, 1987, 1971 by Barron's Educational Series, Inc. All rights reserved. No part of this book may be reproduced in any form, by photostat, microfilm, xerography, or any other means, or incorporated into any information retrieval system, electronic or mechanical, without the written permission of the copyright owner. All inquiries should be addressed to: Barron's Educational Series, Inc. 250 Wireless Boulevard Hauppauge, NY 11788 http://www.barronseduc.com Library of Congress Catalog Card No. 00-030344 International Standard Book Number 0-7641-1365-8 Library of Congress Cataloging-in-Publication Data Bromberg, Murray. 1100 words you need to know / Murray Bromberg, Melvin Gordon. p. cm. Includes index. ISBN 0-7641-1365-8 1. Vocabulary. I. Title: Eleven hundred words you need...

Words: 125626 - Pages: 503

Premium Essay

Frank Wood’s Business Accounting Tenth Edition

...FRANK WOOD’S business accounting TENTH EDITION 1 FRANK WOOD & ALAN SANGSTER Additional student support at www.pearsoned.co.uk/wood FRANK WOOD’S business accounting 1 Visit the Business Accounting, tenth edition Companion Website at www.pearsoned.co.uk/wood to find valuable student learning material including: l l l l l l Learning objectives for each chapter Multiple choice questions to help test your learning Review questions and answers Links to relevant sites on the web Searchable online glossary Flashcards to test your knowledge of key terms and definitions Frank Wood 1926–2000 FRANK WOOD’S business accounting TENTH EDITION 1 FRANK WOOD BSc (Econ), FCA and ALAN SANGSTER BA, MSc, Cert TESOL, CA Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE and Associated Companies throughout the world. Visit us on the World Wide Web at www.pearsoned.co.uk First edition published in 1967 Second edition published under the Longman imprint in 1972 Third edition published in 1979 Fourth edition published in 1984 Fifth edition published in 1989 Sixth edition published in 1993 Seventh edition published in 1996 Eighth edition published under the Financial Times Pitman Publishing imprint in 1999 Ninth edition published in 2002 Tenth edition published 2005 © Frank Wood 1967 © Longman Group UK Limited 1972, 1979, 1984, 1989, 1993 © Pearson Professional Limited 1996 © Financial Times Professional Limited 1999 © Pearson Education Limited...

Words: 217335 - Pages: 870

Premium Essay

Do in America

...The DO s Dr. Andrew Taylor Still, 1828 –1917 THE DOS OSTEOPATHIC MEDICINE IN AMERICA Second Edition NORMAN GEVITZ The Johns Hopkins University Press Baltimore & London © 1982, 2004 The Johns Hopkins University Press All rights reserved. Published 2004 Printed in the United States of America on acid-free paper 246897531 The Johns Hopkins University Press 2715 North Charles Street Baltimore, Maryland 21218-4363 www.press.jhu.edu Library of Congress Cataloging-in-Publication Data Gevitz, Norman. The DOs : osteopathic medicine in America / Norman Gevitz.–2nd ed. p. ; cm. Rev ed. of: The D.O.’s. c1982 Includes bibliographical references and index. ISBN 0-8018-7833-0 (alk. paper) — ISBN 0-8018-7834-9 (pbk. : alk. paper) 1. Osteopathic medicine—United States—History. [DNLM: 1. Osteopathic Medicine—history—United States. WB 940 G396d 2004] I. Gevitz, Norman. D.O.’s. II. Title. RZ325.U6G48 2004 615.5′33′0973—dc21 2003012874 A catalog record for this book is available from the British Library. Frontispiece courtesy of the Still National Osteopathic Museum, Kirksville, Missouri. For Kathryn Gevitz This page intentionally left blank CONTENTS Preface & Acknowledgments ix Chapter 1 Andrew Taylor Still THE MISSOURI MECCA IN THE FIELD 39 1 22 Chapter 2 Chapter 3 Chapter 4 STRUCTURE & FUNCTION EXPANDING THE SCOPE 54 69 85 Chapter 5 Chapter 6 THE PUSH FOR HIGHER STANDARDS A QUESTION OF IDENTITY The California Merger 101 115...

Words: 99946 - Pages: 400

Free Essay

Test2

...62118 0/nm 1/n1 2/nm 3/nm 4/nm 5/nm 6/nm 7/nm 8/nm 9/nm 1990s 0th/pt 1st/p 1th/tc 2nd/p 2th/tc 3rd/p 3th/tc 4th/pt 5th/pt 6th/pt 7th/pt 8th/pt 9th/pt 0s/pt a A AA AAA Aachen/M aardvark/SM Aaren/M Aarhus/M Aarika/M Aaron/M AB aback abacus/SM abaft Abagael/M Abagail/M abalone/SM abandoner/M abandon/LGDRS abandonment/SM abase/LGDSR abasement/S abaser/M abashed/UY abashment/MS abash/SDLG abate/DSRLG abated/U abatement/MS abater/M abattoir/SM Abba/M Abbe/M abbé/S abbess/SM Abbey/M abbey/MS Abbie/M Abbi/M Abbot/M abbot/MS Abbott/M abbr abbrev abbreviated/UA abbreviates/A abbreviate/XDSNG abbreviating/A abbreviation/M Abbye/M Abby/M ABC/M Abdel/M abdicate/NGDSX abdication/M abdomen/SM abdominal/YS abduct/DGS abduction/SM abductor/SM Abdul/M ab/DY abeam Abelard/M Abel/M Abelson/M Abe/M Aberdeen/M Abernathy/M aberrant/YS aberrational aberration/SM abet/S abetted abetting abettor/SM Abeu/M abeyance/MS abeyant Abey/M abhorred abhorrence/MS abhorrent/Y abhorrer/M abhorring abhor/S abidance/MS abide/JGSR abider/M abiding/Y Abidjan/M Abie/M Abigael/M Abigail/M Abigale/M Abilene/M ability/IMES abjection/MS abjectness/SM abject/SGPDY abjuration/SM abjuratory abjurer/M abjure/ZGSRD ablate/VGNSDX ablation/M ablative/SY ablaze abler/E ables/E ablest able/U abloom ablution/MS Ab/M ABM/S abnegate/NGSDX abnegation/M Abner/M abnormality/SM abnormal/SY aboard ...

Words: 113589 - Pages: 455