Management Information Systems 13Th Edition Laudon Test Bank Full Chapter PDF

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 44

Management Information Systems 13th

Edition Laudon Test Bank


Visit to download the full and correct content document: https://testbankdeal.com/dow
nload/management-information-systems-13th-edition-laudon-test-bank/
Management Information Systems, 13e (Laudon/Laudon)
Chapter 7 Telecommunications, the Internet, and Wireless Technology

1) Telephone networks are fundamentally different from computer networks.


Answer: TRUE
Diff: 2 Page Ref: 249
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.1

2) Wikis allow visitors to change or add to the original posted material.


Answer: TRUE
Diff: 1 Page Ref: 275
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

3) An NOS must reside on a dedicated server computer in order to manage a network.


Answer: FALSE
Diff: 2 Page Ref: 251
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.1

4) A hub is a networking device that connects network components and is used to filter and
forward data to specified destinations on the network.
Answer: FALSE
Diff: 2 Page Ref: 251
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.1

5) In a client/server network, a network server provides every connected client with an address
so it can be found by others on the network.
Answer: TRUE
Diff: 2 Page Ref: 252
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.1

6) A computer network consists of at least three computers.


Answer: FALSE
Diff: 2 Page Ref: 250
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.1

1
Copyright © 2014 Pearson Education, Inc.
7) Central large mainframe computing has largely replaced client/server computing.
Answer: FALSE
Diff: 2 Page Ref: 253
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.2

8) Circuit switching makes much more efficient use of the communications capacity of a
network than does packet switching.
Answer: FALSE
Diff: 1 Page Ref: 253
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.1

9) Two computers using TCP/IP can communicate even if they are based on different hardware
and software platforms.
Answer: TRUE
Diff: 1 Page Ref: 255
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.1

10) Over 80% of U.S. Internet users access the Internet via mobile devices.
Answer: FALSE
Diff: 3 Page Ref: 250
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.1

11) Coaxial cable is similar to that used for cable television and consists of thickly insulated
copper wire.
Answer: TRUE
Diff: 2 Page Ref: 257
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.1

12) Fiber-optic cable is more expensive and harder to install than wire media.
Answer: TRUE
Diff: 2 Page Ref: 257
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.1

2
Copyright © 2014 Pearson Education, Inc.
13) The number of cycles per second that can be sent through any telecommunications medium
is measured in kilobytes.
Answer: FALSE
Diff: 2 Page Ref: 257
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.1

14) The Domain Name System (DNS) converts IP addresses to domain names.
Answer: TRUE
Diff: 2 Page Ref: 259
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

15) VoIP technology delivers video information in digital form using packet switching.
Answer: TRUE
Diff: 1 Page Ref: 265
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

16) Web 3.0 is an effort to add a layer of meaning to the existing Web in order to reduce the
amount of human involvement in searching for and processing Web information.
Answer: TRUE
Diff: 2 Page Ref: 276
AACSB: Reflective thinking skills
CASE: Comprehension
Objective: 7.3

17) In a large company today, you will often find an infrastructure that includes hundreds of
small LANs linked to each other as well as to corporate-wide networks.
Answer: TRUE
Diff: 1 Page Ref: 251
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.2

18) TCP/IP was developed in the 1960s to enable university scientists to locate other computers
on the Internet.
Answer: FALSE
Diff: 2 Page Ref: 254
AACSB: Reflective thinking skills
CASE: Comprehension
Objective: 7.2

3
Copyright © 2014 Pearson Education, Inc.
19) Mobile search makes up 20% of all Internet searches.
Answer: TRUE
Diff: 1 Page Ref: 272
AACSB: Reflective thinking skills
CASE: Comprehension
Objective: 7.4

20) RFID technology is being gradually replaced by less costly technologies such as WSNs.
Answer: FALSE
Diff: 2 Page Ref: 280-282
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.4

21) The device that acts as a connection point between computers and can filter and forward data
to a specified destination is called a(n)
A) hub.
B) switch.
C) router.
D) NIC.
Answer: B
Diff: 1 Page Ref: 251
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.1

22) The Internet is based on which three key technologies?


A) TCP/IP, HTML, and HTTP
B) TCP/IP, HTTP, and packet switching
C) client/server computing, packet switching, and the development of communications standards
for linking networks and computers
D) client/server computing, packet switching, and HTTP
Answer: C
Diff: 2 Page Ref: 252
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.1

4
Copyright © 2014 Pearson Education, Inc.
23) The method of slicing digital messages into parcels, transmitting them along different
communication paths, and reassembling them at their destinations is called
A) multiplexing.
B) packet switching.
C) packet routing.
D) ATM.
Answer: B
Diff: 1 Page Ref: 253
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.1

24) The telephone system is an example of a ________ network.


A) peer-to-peer
B) wireless
C) packet-switched
D) circuit-switched
Answer: D
Diff: 1 Page Ref: 253
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.1

25) Which of the following is not a characteristic of packet switching?


A) Packets travel independently of each other.
B) Packets are routed through many different paths.
C) Packet switching requires point-to-point circuits.
D) Packets include data for checking transmission errors.
Answer: C
Diff: 2 Page Ref: 253
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.1

26) In TCP/IP, IP is responsible for


A) disassembling and reassembling of packets during transmission.
B) establishing an Internet connection between two computers.
C) moving packets over the network.
D) sequencing the transfer of packets.
Answer: A
Diff: 3 Page Ref: 254
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.1

5
Copyright © 2014 Pearson Education, Inc.
27) In a telecommunications network architecture, a protocol is
A) a device that handles the switching of voice and data in a local area network.
B) a standard set of rules and procedures for control of communications in a network.
C) a communications service for microcomputer users.
D) the main computer in a telecommunications network.
Answer: B
Diff: 2 Page Ref: 254
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.1

28) What are the four layers of the TCP/IP reference model?
A) physical, application, transport, and network interface
B) physical, application, Internet, and network interface
C) application, transport, Internet, and network interface
D) application, hardware, Internet, and network interface
Answer: C
Diff: 3 Page Ref: 255
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.1

29) Which signal types are represented by a continuous waveform?


A) laser
B) optical
C) digital
D) analog
Answer: D
Diff: 2 Page Ref: 255
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.1

30) To use the analog telephone system for sending digital data, you must also use
A) a modem.
B) a router.
C) DSL.
D) twisted wire.
Answer: A
Diff: 1 Page Ref: 255
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.1

6
Copyright © 2014 Pearson Education, Inc.
31) Which type of network is used to connect digital devices within a half-mile or 500-meter
radius?
A) Wi-Fi
B) LAN
C) WAN
D) MAN
Answer: B
Diff: 2 Page Ref: 256
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.2

32) Which type of network treats all processors equally, and allows peripheral devices to be
shared without going to a separate server?
A) peer-to-peer
B) wireless
C) LAN
D) Windows domain network
Answer: A
Diff: 2 Page Ref: 256
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.2

33) Which type of network would be most appropriate for a business that comprised three
employees and a manager located in the same office space, whose primary need is to share
documents?
A) MAN
B) Domain-based LAN
C) Peer-to-peer network
D) WAN
Answer: C
Diff: 2 Page Ref: 256
AACSB: Analytic skills
CASE: Evaluation in terms of assess
Objective: 7.2

34) WSNs are designed for


A) connecting multiple wireless computing devices.
B) monitoring the physical environment.
C) increasing the reach of Wi-Fi networks.
D) tracking the movement of goods in a supply chain.
Answer: B
Diff: 2 Page Ref: 283
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.5
7
Copyright © 2014 Pearson Education, Inc.
35) All of the following are physical components of an RFID system except
A) bar code.
B) antenna.
C) radio transmitters.
D) tags.
Answer: A
Diff: 2 Page Ref: 280-281
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.5

36) Which digital cellular standard is used widely throughout the world except the United States?
A) GSM
B) CDMA
C) WLAN
D) LTD
Answer: A
Diff: 3 Page Ref: 277
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.4

37) A network that spans a city, and sometimes its major suburbs as well, is called a
A) CAN.
B) MAN.
C) LAN.
D) WAN.
Answer: B
Diff: 1 Page Ref: 257
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.2

38) A network that covers entire geographical regions is most commonly referred to as a(n)
A) local area network.
B) intranet.
C) peer-to-peer network.
D) wide area network.
Answer: D
Diff: 1 Page Ref: 257
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.2

8
Copyright © 2014 Pearson Education, Inc.
39) The concept of a future Web in which it is commonplace for everyday objects to be
connected, controlled or monitored over the Internet is called
A) the Web of things.
B) the Semantic Web.
C) Internet2.
D) a 3-D Web.
Answer: A
Diff: 2 Page Ref: 276
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

40) Bandwidth is the


A) number of frequencies that can be broadcast through a medium.
B) number of cycles per second that can be sent through a medium.
C) difference between the highest and lowest frequencies that can be accommodated on a single
channel.
D) total number of bytes that can be sent through a medium per second.
Answer: C
Diff: 2 Page Ref: 258
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.2

41) The total amount of digital information that can be transmitted through any
telecommunications medium is measured in
A) bps.
B) Hertz.
C) baud.
D) gigaflops.
Answer: A
Diff: 2 Page Ref: 257
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.2

42) Digital subscriber lines


A) operate over existing telephone lines to carry voice, data, and video.
B) operate over coaxial lines to deliver Internet access.
C) are very-high-speed data lines typically leased from long-distance telephone companies.
D) have up to twenty-four 64-Kbps channels.
Answer: A
Diff: 2 Page Ref: 258
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

9
Copyright © 2014 Pearson Education, Inc.
43) T1 lines
A) operate over existing telephone lines to carry voice, data, and video.
B) operate over coaxial lines to deliver Internet access.
C) are high-speed, leased data lines providing guaranteed service levels.
D) have up to twenty-four 64-Kbps channels.
Answer: C
Diff: 2 Page Ref: 258
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

44) Which protocol is the Internet based on?


A) TCP/IP
B) FTP
C) packet-switching
D) HTTP
Answer: A
Diff: 1 Page Ref: 258
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

45) What service converts IP addresses into more recognizable alphanumeric names?
A) HTML
B) DNS
C) IP
D) HTTP
Answer: B
Diff: 2 Page Ref: 259
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

46) The child domain of the root is the


A) top-level domain.
B) second-level domain.
C) host name.
D) domain extension.
Answer: A
Diff: 2 Page Ref: 259
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

10
Copyright © 2014 Pearson Education, Inc.
47) In the domain name "http://books.azimuth-interactive.com", which element is the second-
level domain?
A) books
B) azimuth-interactive
C) com
D) none; there is no second-level domain in this name
Answer: B
Diff: 2 Page Ref: 259
AACSB: Use of information technology
CASE: Analysis in terms of compare
Objective: 7.3

48) Which organization helps define the overall structure of the Internet?
A) none (no one "owns" the Internet)
B) W3C
C) ICANN
D) IAB
Answer: D
Diff: 3 Page Ref: 261
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

49) IPv6 is being developed in order to


A) update the packet transmission protocols for higher bandwidth.
B) create more IP addresses.
C) allow for different levels of service.
D) support Internet2.
Answer: B
Diff: 2 Page Ref: 261
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

50) Which of the following services enables logging on to one computer system and working on
another?
A) FTP
B) World Wide Web
C) newsgroups
D) telnet
Answer: D
Diff: 3 Page Ref: 264
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

11
Copyright © 2014 Pearson Education, Inc.
51) Instant messaging is a type of ________ service.
A) chat
B) cellular
C) e-mail
D) wireless
Answer: A
Diff: 1 Page Ref: 264
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

52) Which of the following statements about RFID is not true?


A) RFIDs transmit only over a short range.
B) RFIDs use an antenna to transmit data.
C) Microchips embedded in RFIDs are used to store data.
D) RFIDs require line-of-sight contact to be read.
Answer: D
Diff: 2 Page Ref: 280-281
AACSB: Reflective thinking skills
CASE: Comprehension
Objective: 7.5

53) ________ integrate(s) disparate channels for voice communications, data communications,
instant messaging, e-mail, and electronic conferencing into a single experience.
A) Wireless networks
B) Intranets
C) Virtual private networks
D) Unified communications
Answer: D
Diff: 1 Page Ref: 268
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

54) A VPN
A) is an encrypted private network configured within a public network.
B) is more expensive than a dedicated network.
C) provides secure, encrypted communications using Telnet.
D) is an Internet-based service for delivering voice communications.
Answer: A
Diff: 2 Page Ref: 268
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

12
Copyright © 2014 Pearson Education, Inc.
55) Web browser software requests Web pages from the Internet using which protocol?
A) URL
B) HTTP
C) DNS
D) HTML
Answer: B
Diff: 2 Page Ref: 269
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

56) Together, a protocol prefix, a domain name, a directory path, and a document name, are
called a(n)
A) uniform resource locator.
B) IP address.
C) third-level domain.
D) root domain.
Answer: A
Diff: 2 Page Ref: 269
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

57) The most common Web server today, controlling 59 percent of the market, is
A) Microsoft IIS.
B) WebSTAR.
C) Apache HTTP Server.
D) Netscape Server.
Answer: C
Diff: 2 Page Ref: 270
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

58) What technology allows people to have content pulled from Web sites and fed automatically
to their computers?
A) FTP
B) RSS
C) HTTP
D) Bluetooth
Answer: B
Diff: 2 Page Ref: 274-275
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

13
Copyright © 2014 Pearson Education, Inc.
59) The process of employing techniques to help a Web site achieve a higher ranking with the
major search engines is called
A) VPN.
B) IAB.
C) SEM.
D) SEO.
Answer: D
Diff: 1 Page Ref: 272
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

60) Which of the following statements is not true about search engines?
A) They are arguably the Internet's "killer app."
B) They have solved the problem of how users instantly find information on the Internet.
C) They are monetized almost exclusively by search engine marketing.
D) There are hundreds of search engines vying for user attention, with no clear leader having yet
emerged.
Answer: D
Diff: 1 Page Ref: 270-272
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

61) Which of the following is the first generation of cellular systems suitable for watching
videos?
A) 2G
B) 2.5G
C) 3G
D) 4G
Answer: D
Diff: 2 Page Ref: 277
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

62) 4G networks are also known as ________ networks.


A) GSM
B) CDMA
C) LTD
D) T-Mobile
Answer: C
Diff: 2 Page Ref: 277
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

14
Copyright © 2014 Pearson Education, Inc.
63) The most appropriate wireless networking standard for creating PANs is
A) I-mode.
B) IEEE 802.11b.
C) Wi-Fi.
D) Bluetooth.
Answer: D
Diff: 2 Page Ref: 278
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.4

64) Bluetooth can be used to link up to ________ devices within a 10-meter area using low-
power, radio-based communication.
A) four
B) six
C) eight
D) ten
Answer: C
Diff: 3 Page Ref: 278
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.4

65) Which process is used to protect transmitted data in a VPN?


A) tunneling
B) PPP
C) VOIP
D) packet-switching
Answer: A
Diff: 3 Page Ref: 268
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

66) One or more access points positioned on a ceiling, wall, or other strategic spot in a public
place to provide maximum wireless coverage for a specific area are referred to as
A) touch points.
B) hotspots.
C) hot points.
D) wireless hubs.
Answer: B
Diff: 2 Page Ref: 280
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.4

15
Copyright © 2014 Pearson Education, Inc.
67) The 802.11 set of standards is known as
A) WLAN.
B) WSN.
C) Wi-Fi.
D) WiMax.
Answer: C
Diff: 2 Page Ref: 279
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.4

68) The WiMax standard can transmit up to a distance of approximately


A) 30 meters.
B) 500 meters.
C) 30 miles.
D) 5 miles.
Answer: C
Diff: 3 Page Ref: 280
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.4

69) Passive RFID tags


A) have their own power source.
B) have a range of several feet.
C) enable data to be rewritten and modified.
D) are used in automated toll-collection systems.
Answer: B
Diff: 2 Page Ref: 281
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.5

70) Based on your reading of the examples in the chapter, what would be the best use of RFID
for a business?
A) logging transactions
B) managing the supply chain
C) lowering network costs
D) enabling client communication
Answer: B
Diff: 2 Page Ref: 280-282
AACSB: Analytic skills
CASE: Comprehension
Objective: 7.5

16
Copyright © 2014 Pearson Education, Inc.
71) ________ monetizes the value of the data stored by search engines.
Answer: Search engine marketing
Diff: 2 Page Ref: 272
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

72) A(n) ________ is a device that forwards packets of data through different networks, ensuring
that the data gets to the right address.
Answer: router
Diff: 2 Page Ref: 251
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.1

73) ________ combine the functionality of a cell phone with the computing of a laptop.
Answer: Smartphones
Diff: 2 Page Ref: 277
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.4

74) A(n) ________ signal is a discrete, binary waveform that transmits data coded into two
discrete states such as 1-bits and 0-bits.
Answer: digital
Diff: 2 Page Ref: 255
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.2

75) Shopping bots use ________ software for searching the Internet.
Answer: intelligent agent
Diff: 2 Page Ref: 274
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

76) Web sites that enable users to share information, collaborate, and create new services and
content are called ________ sites.
Answer: Web 2.0, second generation
Diff: 2 Page Ref: 274
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

17
Copyright © 2014 Pearson Education, Inc.
77) A(n) ________ is a commercial organization with a permanent connection to the Internet that
sells temporary connections to retail subscribers.
Answer: Internet service provider, ISP
Diff: 2 Page Ref: 258
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

78) The backbone networks of the Internet are typically owned by long-distance telephone
companies called ________.
Answer: network service providers
Diff: 2 Page Ref: 260
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

79) A(n) ________ is software for locating and managing stored Web pages.
Answer: Web server
Diff: 2 Page Ref: 257
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.3

80) A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a
wired network, router, or hub.
Answer: access point
Diff: 2 Page Ref: 279
AACSB: Use of information technology
CASE: Comprehension
Objective: 7.4

81) How does packet switching work?


Answer: Packet switching is a method of slicing digital messages into parcels called packets,
sending the packets along different communication paths as they become available, and then
reassembling the packets once they arrive at their destinations. Packet switching makes much
more efficient use of the communications capacity of a network than did circuit-switching. In
packet-switched networks, messages are first broken down into small fixed bundles of data
called packets. The packets include information for directing the packet to the right address and
for checking transmission errors along with the data. The packets are transmitted over various
communications channels using routers, each packet traveling independently. Packets of data
originating at one source will be routed through many different paths and networks before being
reassembled into the original message when they reach their destinations.
Diff: 2 Page Ref: 253
AACSB: Analytic skills
CASE: Analysis in terms of summarize
Objective: 7.1

18
Copyright © 2014 Pearson Education, Inc.
82) Identify the layers of the Department of Defense reference model for TCP/IP, and describe
how this model works.
Answer: The application layer enables client application programs to access the other layers and
defines the protocols that applications use to exchange data. One of these application protocols is
the Hypertext Transfer Protocol (HTTP), which is used to transfer Web page files. The transport
layer is responsible for providing the application layer with communication and packet services.
This layer includes TCP and other protocols. The Internet layer is responsible for addressing,
routing, and packaging data packets called IP datagrams. The Internet Protocol is one of the
protocols used in this layer. The network interface layer is responsible for placing packets on and
receiving them from the network medium, which could be any networking technology.

Data sent from one computer to the other passes downward through all four layers, starting with
the sending computer's application layer and passing through the network interface layer. After
the data reach the recipient host computer, they travel up the layers and are reassembled into a
format the receiving computer can use. If the receiving computer finds a damaged packet, it asks
the sending computer to retransmit it. This process is reversed when the receiving computer
responds.
Diff: 3 Page Ref: 254-255
AACSB: Analytic skills
CASE: Analysis in terms of summarize
Objective: 7.1

83) Describe and explain the idea of "network neutrality." Are you in favor of network
neutrality? Why or why not?
Answer: Network neutrality describes the current equal access by users to Internet bandwidth,
regardless of the services they are using on the Internet. Network neutrality is the idea that
Internet service providers must allow customers equal access to content and applications,
regardless of the source or nature of the content. Presently, the Internet is indeed neutral: all
Internet traffic is treated equally on a first-come, first-serve basis by Internet backbone owners.
The Internet is neutral because it was built on phone lines, which are subject to "common
carriage" laws. These laws require phone companies to treat all calls and customers equally. For
example, someone using the Internet to download large movie files pays the same rate as
someone accessing their e-mail. Now telecommunications and cable companies want to be able
to charge differentiated prices based on the amount of bandwidth consumed by content being
delivered over the Internet. Student opinions will vary; one might be: I support network
neutrality because the risk of censorship increases when network operators can selectively block
or slow access to certain content.
Diff: 2 Page Ref: 262-263
AACSB: Analytic skills
CASE: Evaluation in terms of assess
Objective: 7.3

19
Copyright © 2014 Pearson Education, Inc.
84) You have been hired by a small new Web design firm to set up a network for its single office
location. The network is primarily needed for exchanging files, accessing and managing beta
Web sites on their Web server, and connecting to the Internet. The firm hires many freelancers
who come into the office on an ad-hoc basis and it does not have a lot of money to spend on
infrastructure. What type of network will you recommend?
Answer: Student answers will vary. An example answer is: I would recommend a mixed wired
and wireless network. The wired LAN would connect the Web servers and primary workstations
and connect via cable service to the Internet. Freelancers could connect wirelessly via access
points.
Diff: 3 Page Ref: 256-280
AACSB: Analytic skills
CASE: Evaluation in terms of assess
Objective: 7.2

85) What are the business advantages of using voice over IP (VoIP) technology?
Answer: Business can lower costs by using the Internet to deliver voice information, avoiding
the tolls charged by local and long-distance telephone networks. They can lower costs from not
having to create a separate telephone network. VOIP enables communication by supporting
Internet conference calls using video. VOIP also provides flexibility—phones can be added or
moved to different offices without rewiring or reconfiguring the network.
Diff: 2 Page Ref: 265-268
AACSB: Analytic skills
CASE: Evaluation in terms of assess
Objective: 7.3

86) How are RFID systems used in inventory control and supply chain management?
Answer: In inventory control and supply chain management, RFID systems capture and manage
more detailed information about items in warehouses or in production than bar coding systems.
If a large number of items are shipped together, RFID systems track each pallet, lot, or even unit
item in the shipment. This technology may help companies improve receiving and storage
operations by enhancing their ability to "see" exactly what stock is stored in warehouses or on
retail store shelves.
Diff: 1 Page Ref: 280-282
AACSB: Analytic skills
CASE: Analysis in terms of summarize
Objective: 7.5

20
Copyright © 2014 Pearson Education, Inc.
87) What are wireless sensor networks? How do they work and what are they used for?
Answer: Wireless sensor networks (WSNs) are networks of interconnected wireless devices that
are embedded into the physical environment to provide measurements of many points over large
spaces. These devices have built-in processing, storage, and radio frequency sensors and
antennas. They are linked into an interconnected network that routes the data they capture to a
computer for analysis. These networks range from hundreds to thousands of nodes. Because
wireless sensor devices are placed in the field for years at a time without any maintenance or
human intervention, they must have very low power requirements and batteries capable of lasting
for years. Wireless sensor networks are valuable in areas such as monitoring environmental
changes; monitoring traffic or military activity; protecting property; efficiently operating and
managing machinery and vehicles; establishing security perimeters; monitoring supply chain
management; or detecting chemical, biological, or radiological material.
Diff: 1 Page Ref: 283
AACSB: Analytic skills
CASE: Analysis in terms of summarize
Objective: 7.5

88) What is Web 3.0, and how do you think Web 3.0 developments could impact businesses?
Answer: Web 3.0 is the vision of the next generation of the Web in which all of the information
available on the Web is woven together into a single experience. The related movement called
the Semantic Web is a collaborative effort to add a layer of meaning to existing information to
reduce the amount of human time spent in searching and processing that information. Student
views on the impact on businesses would vary. An example answer is: This potentially could
have huge effects on businesses as simple analysis becomes mechanized, requiring fewer
humans to perform this basic task.
Diff: 2 Page Ref: 275-276
AACSB: Analytic skills
CASE: Evaluation in terms of assess
Objective: 7.3

89) Blogs, wikis, and social networking sites were designed for individuals to communicate with
each other. What uses do businesses have for these tools? Give specific examples.
Answer: Businesses can use these tools to reach out and market to potential new customers. For
example, many businesses have Facebook sites to market their product to specific groups on
Facebook. They can use these tools to support and give added value to existing customers. For
example, a software company could have a blog that discusses in-depth use of a software
product. Businesses can also use these tools within their company to communicate between
departments and share knowledge. For example, a company wiki could be set up as a repository
of expert information.
Diff: 2 Page Ref: 275
AACSB: Analytic skills
CASE: Synthesis in terms of build, model
Objective: 7.3

21
Copyright © 2014 Pearson Education, Inc.
90) What has made the Google search engine so successful?
Answer: The Google search engine became so successful because it was one of the first search
engines to incorporate page ranking. Not only does it index the Web pages it finds according to
both keywords and combinations of keywords, it also ranks each page according to the number
of pages that link to it, and the number of pages it links to itself. This helped make search results
more relevant when compared to search engines relying solely on key words used on Web pages.
A user could be relatively certain that they would find relevant information within the top results
of a Google search. Improved search results for the user, along with continual improvements to
its search engine, the development and other Web applications, tools, and its Ad Sense product
where it sells keywords to the highest bidder has made Google so successful as a search engine
and marketing firm.
Diff: 2 Page Ref: 271
AACSB: Analytic skills
CASE: Evaluation in terms of assess
Objective: 7.3

22
Copyright © 2014 Pearson Education, Inc.
Another random document with
no related content on Scribd:
Tori suur' oli muuan varsinkin,
taloin ympäröity uhkein;
oli palatsi, asunto kuninkaan,
näkö jonka on mitä muhkein,

(se on palatsin.) — Pääoven edess' on


kopit vahtien molemmin kulmin.
Punatakkeja vahdissa pyssyineen
on muodoin niin murhan-julmin.

Ties oppaani: "Tässä asuu Ernst


Augustus, suurtorylainen
jalo, vanha lordi, mut vuosikseen
hyvin vielä virkeänlainen.

Olo häll' on idyllisen turvallinen,


näet paremmin kuin punanuttuin
kaikki parvet puuttuva uskallus
häntä turvaa rakasten tuttuin.

Hänet joskus nään, ja hän päivittää


miten kuiva virka on kovin
tää kuninkuus, johon tuomittu hän
nyt on päänä Hannoverin hovin.

Isobritannilaisille tavoilleen
muka täällä ahdasta niin on,
ihan pelkää vaan, että silmukkaan
hänet vielä saattava spleen on.

Toiss' aamuna kamiinin ääressä näin


hänen häärivän kumarassa;
oli kuningas kipeille koirilleen
lavemangia laittamassa."
XX LUKU.

Tulin Harburgista Hampuriin ma tunnissa. Oli jo ilta, ja ilma


lempeä, tähtöset mua tervehti taivahilta.

Ja kun äitini luo tulin äkkiään,


ilo hänt' ihan häpsähytti;
"Rakas lapsi kulta!" hän huus ja löi
kädet yhteen, läpsähytti.

"Lapsi kulta, kolmetoista jo on


ohi vuotta, ennenkuin palaat!
Kova nälkä sulla on varmaankin —
sano mitä sä syödä halaat?

On hanhea, kalaa ja kauniita


myös appelsiineja mulla."
"Anna hanhea, kalaa ja kauniita
vain appelsiineja tulla."

Emo ilosta säteili nähdessään


mun ruokahaluni julman,
sen sitä, tuon tätä hän kyseli,
välin pisti pahankin pulman.
"Sun, lapsi kulta, nyt tokko vaan
hyvin siell' on vieraissa laitas?
Tokko rouvas on toimekas emäntä
ja parsii sukkas ja paitas?"

"Kala hyvältä maistuu, maammosein,


mut ääneti syödä se pitää;
niin helposti kurkkuunsa ruodon saa,
älä nyt multa kysele mitään."

Tuli hanhi pöytään, kun popsinut


kalan tuon olin kaunihisti.
Emo sen sitä, tuon tätä kyseli taas,
välin pahankin pulman pisti.

"Sanos, lapsi kulta, nyt kumpi maa


on parempi elää, ja kumpi,
tämä Saksan kansa vai Ranskanko,
on mielestäs mieluhumpi?"

"Hyvä Saksan hanhi on, maammosein,


mut muheammiksi kuin meillä
ne ranskalaisin' on syötetyt,
myös paremmat höysteet on heillä."

Tuli appelsiinien vuoro, kun jo


teki lähtönsä hanhenpaisti;
ne ol' odottamattoman oivia,
ihan mainiolta ne maisti.

Jo äiti minulta mielissään


taas kyseli kyselemätään,
hän muisti sen tuhatkin seikkaa — mun
välin saada ol' aivan hätään.

"Mikä, lapsi kulta, on mieles nyt?


Yhä vieläkö ulkona tuolla
sa politikoit? Nyt kannaltas
minkä puolueen olet puolla?"

"Hyvät appelsiinit on, maammosein, ja tosi nautinnolla imen


suuhuni mehun ma makean ja annan kuorien olla."
XXI LUKU.

Taas alkaa kohota poroistaan vähitellen kaupunki polo; kuin


puudelin puoleksi kerityn on Hampurin hahmo nolo.

Näen murehella ma kadonneen


monen kallismuistoisen kadun. —
Missä talo, joss' suutelot suutelin
ma ensi lempeni sadun?

Missä kirjapaino, jost' ilmoille


mun matkakuvani tuli?
Missä kellari, jossa kerran mun
ens osterit suuhuni suli?

Ja Dreckwall, missä Dreckwall on?


Sit' on hakea turha työ nyt!
Missä paviljonki, joss' olen niin
monet sokeritortut syönyt?

Missä porvariston ja senaatin


koti korkea, raatitalo?
Tulen tuiman saalis! Pyhintäkään
ei säästänyt ahne palo.
Viel' ihmiset huokaili hätäänsä
ja kasvoilla murhe musta
palon suuren surkuteltavaa
he muisteli tapausta:

"Joka haaralla valkea valloillaan,


kaikk' kietoi se liekein ja sauhuin!
Tulipatsaina tornit kirkkojen
ne sortui ryskein ja pauhuin.

On porona vanha pörssi nyt,


joss' isämme asioivat
läpi vuosisatojen keskenään
niin rehellisesti kuin voivat.

Pankki, kaupungin kultainen sielu, jäi,


Herran kiitos! ja kirjat, joissa
joka miehen arvo merkitty
on selvissä numeroissa.

Meille kansat kaukaisimmatkin


keräs apua, kiitos Herran!
hyvä kauppa — se kolehti tuotti noin
miljoonan kahdeksan verran.

Tosihurskaat ja kristityt hoitivat


apukassaa tuota — ei tiennyt
käsi vasempi konsaan, paljonko
oli oikea kulloinkin vienyt.

Avoimiin käsiimme tulvanaan


tuli rahaa kaikista maista,
elintarpeita myös, ylenkatsottu
ei lahjaa minkäänlaista.

Tuli leivät ja lihat ja liemet myös,


puvut, peitteet tukkunansa!
Meille miel' oli Preussin kuninkaan
myös johtaa jo joukkojansa.

Tuho aineellinen tuli korvatuks,


se voitiin arvioida —
mutta hirmu se, meidän hirmumme,
sit' ei millään korvata voida!"

Sanoin rohkaisevasti ma: "Ette saa


noin, veikkoset, itkua valaa;
oli Troija parempi kaupunki,
vaan silt' oli pakko palaa.

Talot uudet tehkää ja kuivatkaa


pois katuinne ropakko-roiskut,
ja paremmat lait te laittakaa
ja paremmat paloruiskut.

Ei kilpikonna-lientänne
pidä liiaksi pippuroittaa,
nuo lihavat suomukarppinne myös
voi terveyttä vahingoittaa.

Vähän vaaraa kalkkunat teille saa,


vaan varottavammat on pillat
sen linnun, mi pesäks on ottanut
pormestarin peruukkivillat.
Mikä turman lintu se on, sit' ei
tässä tarvis sanoa mulla.
Mult' aina, kun sitä aattelen vaan,
ylös tahtoo yökätys tulla."
XXII LUKU.

Vielä muuttuneemmat kuin kaupunki on kaikk' ihmiset —


kallella-päiset ja apeat kadulla astuissaan kuin rauniot
käveleväiset.

On hoikat viel' yhä hoikenneet,


yhä pullistuneet on pulleet,
on lapset vanhoja, vanhat taas
on jälleen lapsiksi tulleet.

Moni imuvasikka entinen


nyt mua jo mullina kohtaa;
moni pikku hanhonen piiperö
emähanhen jo höyhenin hohtaa.

On vanha Gudel maalattu


ja siistitty sireeni-somaks;
tukan mustan ja hampaat valkeat
upo-uudet on hankkinut omaks.

Oli tuttuni, paperikauppias tuo,


lujin kestämään ajan hallan;
pää kehäss' on hiusten kellahtavain —
kuin Johannes kastaja vallan.

Näin ————:n vilahtamalta vain,


ohi pyyhkäs kuin puhallettu;
aju palanut raukan, ja Bieberill'
oli kuulemma vakuutettu.

Näin vanhan sensori-kuomanikin.


Tuli halki usman ja huurun
hän Hanhitorilla vastaani, —
pään kantoi kovin jo kuurun.

Me toistemme kättä pudistettiin,


ukon silmään kyynel täytti.
Miten iloitsikaan minut nähden taas!
Se liikuttavalta näytti. —

En kaikkia tavannut. Ajalliset


monelt' askeleet jo on laanneet.
Ah, silmäni Gumpelinoakaan
eloss' enää ei nähdä saaneet!

Pois suuren sielunsa henkäsi


jalo tuo juur' ennenkuin saavuin,
Jehovan istuimen eess' on nyt
seraafina kirkkain kaavuin.

Tuota käyrää Adonista turhaan hain


halki Hampurin kadut ja torit,
jolla kuppeja, yöposliineja
oli kaupan kukkurakorit.
Pikku Meyer vieläkö elossa lie,
sitä tiedä en toden totta;
en nähnyt miestä ja unohdin
selon Cornetilta ottaa.

Sarras, tuo puudeli uskollinen,


pois kuollut on — haikea hukka!
Kynäniekkaa kymmenen ennen maar
ois uhrannut Campe rukka. — —

On juutalaista ja kristittyä,
niin kauas kuin muisti kantaa,
väki Hampurin; — jälkimmäistenkään
tapa juur' ei ilmaiseks antaa.

Koko hyviä kristityt kaikk' on, myös


hyvin päivällisensä syövät,
ja vekselinlankeema-päivänsä
hyvin harvoin he laiminlyövät.

Taas juutalaisten joukkoa kaks


eri puoluetta on heitä;
synagoogassa vanhat vaeltaa
ja nuoret temppelinteitä.

Halu hangotella on nuorten, ne


sianlihan on nielijöitä,
demokraatteja; vanhat pikemmin taas
ovat ylimysmielijöitä.

Pidän vanhoista, pidän nuorista,


vaan varma se on kuin vala,
eräs muu laji: silakat savustetut,
on vielä parempi kala.
XXIII LUKU.

Tasavaltoina Hampurin varjoon saa hyvin Venedig sekä


Florens, mut on Hampurin osterit oivemmat, myö parhaita
kellari Lorenz.

Oli kaunis ilta, kun Campe vei


minut sinne, — meill' iltatuimaan
oli tuumana Reininviinissä
siell' osterit panna uimaan.

Hyvä seura siell' oli myös, mä näin


iloll' entistä veikkoa monta,
Chaufepién esimerkiksi, monta myös
uutta, ennen tuntematonta.

Oli Willen viiruinen naama, tuo


sukukirja, kärjellä miekkain
käsialaa täyteen kirjattu
akadeemisten vihasniekkain.

Ja Fucks oli, umpipakana,


verivihollinen. Jehovan,
vain Hegeliin uskoo ja hiukan myös
kai Venukseen Canovan.

Oli Campeni jalo Amphitryon,


hymy huulilla luopumatonna;
hänen silmänsä autuutta säteili
kuin kirkastettu Madonna.

Ma aattelin, pöydän aarteita


alas kaulaani halulla ajain:
"Tuo Campe on todella suuri mies,
kukka kaikkien kustantajain.

Joku toinen ois nälässä antanut


mun kulkea maita, teitä,
tää juottaa janonkin sammuksiin;
hänt' en mä ikinä heitä.

Ole kiitetty, luoja taivahan,


tään rypälemehun kun luonut,
ja kustantajaksi kun minulle
olet Julius Campen suonut!

Ole kiitetty, luoja taivahan,


kun suuri tulkoon-sanas
loi osterit mereen ja kasvamaan
maan Reininviiniä manas!

Sitruunia myöskin, antamaan


meren ostereille mehun —
tän' yönä suo, isä, vatsassain
vain hyvästi sulaa rehun!"
Tuo Reininviini niin hellyttää
minut aina, rinnasta haipuu
joka ristiriita, siell' elähtää
syvä ihmislemmen kaipuu.

Mun ajaa se katuja astelemaan


ulos alle taivallan välkeen;
sydän sydäntä hakee, ja silmä käy
valkohelmain hentojen jälkeen.

Ihan riutua moisena hetkenä


olen kaihoon, mi rinnan täyttää;
katit kaikki harmailta silmissäin,
Helenoilta naiset näyttää. — — —

Ja Drehbanin päähän päästessäin


kuun valossa kuninkainen
tuli vastaani vaimo-ihminen,
ylen korkeapovinen nainen.

Oli kukkeat kasvot kuin täysi kuu,


sini silmäin kuin turkoosikivi,
kuin ruusut posket, kuin kirsikka suu,
nenä myös vähän punehtivi.

Päässä päähine valkealiinainen


ihan linnakruunun malliin,
sen tärkkäys poimuihin taitettu
kuin tornit ja sakarat valliin.

Hän kantoi valkoista tunikkaa


alas pohkeille ulottuvaista.
Ja mitkä pohkeet! Kulkimet kuin
pari pylvästä doorilaista.

Mitä maallisin, mitä luonnollisin


joka ilme, mut että vaimo
oli ylempi olento, tiesi taus
yli-inhimillisen aimo.

Kävi kohti hän virkkain: "Terve taas


tykö Elben pitkältä tieltäs —
nuo kolmetoista ei vuotta viel'
ole, näämmä, muuttanut mieltäs!

Haet noita kauniita sieluja kai,


kera joitten niin monesti muinen
tässä kauniissa seudussa karkeli pois
sult' yö sulohaaveiluinen.

Nieli elämä, hirviö satapää,


ne jo irjuvin ikenineen;
pois aika vanha on vaipunut
jo armaine ajattarineen!

Poiss' on sulokukkaset, sydämes


jumaloimat nuoren — ne kukat
on langenneet, on lakastuneet,
ne myrsky runteli rukat.

Ne kuihtui, murtui, musertui


raa'an kohtalon-anturan alle —
niin, veikkonen, täällä kaikelle käy
ihanalle ja armahallel"
"Ken olet sa?" — huusin ma — "olethan
kuin unelma aikojen takaa!
Miss' asut sa, korkea kulkijatar,
ja saanko matkas ma jakaa?"

Hän hymyillen virkkoi: "Sa erehdyt,


olen kunniallinen nainen,
siveellinen, hieno henkilö, en
katuperhonen kaikellainen.

En moinen pikku mamselli,


siro etelän seikkailijatar —
sa tiedä: Hammonia, Hampurin
olen suojelusjumalatar!

Sä säpsähdät, laulaja uljas sa,


sä säpsähdät, säikähdytkin!
No niin, tule äläkä tuumaile,
jos tahdot seurata nytkin!"

Hohonaurussa tuohon ma huudahdin: "Heti kanssas ma


tulla tuumaan — käy edellä vaan, peräss' astutaan, vie vaikka
hornaan kuumaan!"
XXIV LUKU.

Miten salin ahtaista portaista lien ylös tullut, sit' en mä tiedä;


mua näkymättömät henget kai ylös sinne mahtoi viedä.

Siellä, kammiossa Hammonian,


pian hetket herttaiset kulki.
Mulle sympatiansa Jumalatar
jo vanhan tunnusti julki.

"Näes", — virkkoi hän — "ennen enimmän


tuo laulaja lempeni voitti,
joka meille hartaalla harpullaan
Messiaan suuruutta soitti.

Klopstockini kipsinen kaapin pääll'


on vielä, mut verkoissa lukin,
jo vuosia mulla hän ollut on
vain toimessa myssytukin.

Sua lemmin ma nyt. Näet vuoteeni


pääpohjissa kuvasi oman,
ja tuores laakeri, katsopas,
on seppelnä kuvan soman.
Se vaan, että olet mun poikiain
niin näykkinyt usein, se mua
välin todella syvästi loukkas, — nyt ei
saa enää se tapahtua.

Kera vuotten suita jo vallattomuus


tuo toivottavasti talttui,
ja mieles narreja kohtaankin
kai suvaitsevammaksi malttui.

Vaan sanos, kuinka sun pohjolaan


tuli matkata tuuma päähän
tähän vuoden-aikaan, kun tantereet
vilu talven jo vetää jäähän?"

"Oi Jumalatar!" — ma vastasin —


"syväll' ihmispovessa asuu
moni uinuva aatos, mi heräämään
ihan väärällä hetkellä osuu.

Hyvin päällisin puolin ma kyllä voin,


mut sisällä vaiva valvoi,
se päivä päivältä paheni vaan —
mua kotikaipaus kalvoi.

Kävi painostamaan tuo muuten niin


kevyt Ranskan ilma mua;
piti tänne päästäni hengittämään,
jos mieli ei tukehtua.

Käry turpeen ja tupakan täällä taas


piti tuntea täyttä rintaa;

You might also like