2.99 See Answer

Question: Establishing a unique ____________ or network name


Establishing a unique ____________ or network name helps ensure that only wireless network devices configured similarly are permitted access to the network.


> Android devices can use ___________ to terminate a single running application and all of its services or background processes.

> A fingerprint lock is an example of ___________________.

> A(n) ______________ policy enables individual employees to use personal mobile devices at work.

> Knowledge, possession, and inherence are the primary elements of_________________ .

> A factory reset is also known as a(n) ___________ or a(n)____________ .

> In order to protect against password guessing, _____________ may occur after too many failed attempts to unlock the lock screen.

> ___________ , _____________, and _______________are processes for removing restrictions and gaining elevated access to Android, iOS, and Windows Phone devices.

> Much like a reboot on a regular computer, a(n) __________ restarts a device.

> App developers use a mobile operating system’s _____________ to build apps for devices running the OS.

> A(n) ______________ is a monitor with some type of sensing device across its face that detects the location and duration of contact, usually by a finger or stylus.

> The _____________ system can send a(n) ___________ such as an AMBER alert to devices in the relevant area.

> A wearable device that counts your steps or measures your heart rate is called a(n)___________.

> When you want to buy software for an Android device, you buy from ___________..

> The _____________ enables a mobile device to determine where you are on a map.

> A(n) ___________ is a standalone device designed to be easier to use for the purpose of reading.

> The feature that enables a user to rotate a tablet and have the screen rotate with the device is called a(n)____________.

> A(n) __________ is a compromise between the functionality of a(n) ________ and the greater screen space of a(n)__________.

> Swiping your finger across the screen on a mobile device to switch the screen to the next item, such as the next page in an eBook, is one example of the role ________ play in the user interface.

> All mobile operating systems have a(n) ____________ that enables users to interact with the device.

> Laptops using ______________ are less expensive because the video card has less built-in memory, but the RAM it borrows from the system results in less memory available to programs.

> A(n) ____________ scans the chip embedded in such devices as ID badges to enhance access and security.

> Windows enables ____________ for storing and automatically syncing files and folders between a portable and a file server.

> Today’s laptops use _____________ for batteries because that battery chemistry provides the highest energy density for the weight.

> A(n) __________ plugs into a single (often proprietary) port on the portable computer and offers legacy and modern single and multifunction ports, as well as features like an optical drive or expansion card slots.

> ________________ is a(n) external expansion slot on older laptops.

> Intel set up the _____________ specifications for super thin, super light, and super efficient laptops with integrated graphics and no optical drive.

> Many newer laptops feature ____________ screens offering richer color, higher contrast, and wider viewing angles.

> The _______________ enables laptop keyboards to do more than two functions on a single key.

> Most laptops today have one or more __________ or _________ slots for internal expansion cards such as Wi-Fi NICs.

> A typical clamshell-style portable computer with built-in LCD monitor, keyboard, and input device is most commonly called a laptop or_____________.

> A(n) _______________ enables you to access a remote network over the Internet securely.

> The ______________ standard connects computing devices with a Mini DisplayPort connector.

> Apple developed the ________________ to support file sharing between Macintosh computers on early LANs.

> The service that provides the structure for the World Wide Web, allowing documents to be sent across the Web, is ________________.

> By using an anonymous logon, _____________ allows you to send and receive files from a public site.

> A(n) ______________ is software that enables multiple connections to go to the Internet through one protected PC.

> The most common method used to encrypt information, such as credit card numbers, on the Internet is _______________.

> Internet Explorer is a(n) _____________.

> The time it takes for a packet to travel to its destination and back is called ___________.

> Using UDP port 161, ________________ enables remote management of network devices.

> You can access the Internet by leasing a connection from a(n) ______________.

> The ______________ feature enables devices on 802.11n networks to make multiple simultaneous connections, allowing for a theoretical throughput of 600 Mbps.

> A(n) ____________ FireWire device transfers data at up to 800 Mbps.

> If you need to share an Internet connection or connect to a wired network through your wireless network, you would use ____________.

> The wireless Ethernet standard that runs at speeds up to 54 Mbps but has limited range because it uses the 5-GHz frequency is ___________.

> Of the three common wireless encryption protocols, _____________ is the least secure.

> The 802.11 protocol is more commonly known as ________.

> Computers are in ___________ when they connect directly together without using a WAP.

> The wireless Ethernet standard that operates at a maximum of 54 Mbps on the 2.4-GHz frequency is __________.

> 802.11 implements________________ , which proactively avoids network packet collisions rather than simply detecting them when they occur.

> A technology for setting up wireless PANs and connecting to some peripherals is called____________.

> When troubleshooting a NIC, you’ll need to crawl behind your computer and look for a __________ , which should be on or blinking.

> While a CD-ROM disc holds about 650 MB of data, a(n) __________ stores from 4.37 GB to 15.9 GB, depending on the number of sides and layers used.

> A(n) _______________ server enables computers to obtain IP addresses automatically.

> Special computers, called ____________ servers, keep databases of IP addresses and their corresponding names.

> A(n) ________ is a device that has at least two IP addresses: one that connects to your LAN’s switch and one that connects to the “next network.”

> A computer on a(n) ______________ network gets a 128-bit address.

> A computer on a(n) ____________ network gets a 32-bit address.

> A NIC uses a value called the __________ to distinguish which part of the IP address identifies the network ID and which part of the address identifies the host.

> The command-line utility called __________ enables one machine to check whether it can communicate with another machine.

> To test a possibly broken Ethernet port, plug in a(n)_____________ .

> HTTP and SSH are both examples of special sharing functions called___________ .

> The central location that all cabling runs to is called the_______________ .

> A(n) ___________ device transfers data at up to 12 Mbps on the universal serial bus.

> All the cabling from individual work areas runs via ____________ to a central location.

> Routers enable multiple LANs to connect into a(n) ____________ . Answer: Routers enable multiple LANs to connect into a(n) wide area network (WAN).

> All NICs have a unique identifier called a(n)______________ .

> Most Ethernet networks have a central box called a(n)_________ .

> Most Ethernet networks use copper UTP wiring, but a(n) _________ enables much greater distance between two hosts.

> The most common Ethernet topology is__________ .

> Ethernet cables typically use a(n) _________ connector.

> A single piece of installed horizontal cabling is called a(n)______________ .

> The _______ version of Ethernet runs at 100 Mbps.

> A(n) ______________ handles the video processing chores in modern systems.

> A virus that changes its signature to prevent detection is called a(n)_______________ .

> Mary’s company routinely labels data according to its sensitivity or potential danger to the company if someone outside accesses the data. This is an example of_____________.

> Aaron, who we met in Exercise 28, tends to be optimistic about business conditions. What is his maximax strategy that would maximize his results?

> Shawn Overgrowth, whom we met in Exercise 27, is an entrepreneur who is optimistic about the growing season. What choice should he make to maximize his return? His assistant, Lance Broadleaf, is very conservative, and argues that KickGrass should minimiz

> Demand and price are related; raising prices typically lowers demand. Many companies understand that if they can segment their market and offer different prices to different segments, they can often capture more revenue. Aaron’sAir is a small commuter ai

> KickGrass Lawncare is a service that cares for lawns in a large, affluent community. Shawn Overgrowth, the owner, is considering the purchase of new zero-turn riding lawn tractors, which would allow him to expand his business. The tractors cost $6300 eac

> The company in Exercises 14, 22, and 24 could send a team to Saudi Arabia to obtain additional information about the probabilities that oil will increase or decrease in price. They hope that the fact-finding trip would choose between the two alternatives

> The company from Exercises 13, 21, and 23 has the option of hiring an economics consulting firm to predict consumer confidence. The company has already considered that the probability of rising consumer confidence could be as high as 0.70 or as low as 0.

> For the energy investment of Exercise 22 and using both of the probabilities considered in that exercise, find the Expected Value of Perfect Information.

> a) For the advertising strategies of Exercise 21 and using the probability of 0.70 for rising consumer confidence, what is the Expected Value of Perfect Information (EVPI)? b) What is the EVPI if the probability of rising consumer confidence is only 0.40

> a) For the payoff table in Exercise 14, find the investment strategy under the assumption that the probability that the price of oil goes substantially higher is 0.4 and that the probability that it goes substantially lower is 0.2. b) What if those two p

> For the payoff table in Exercise 13, find the action with the highest expected value. a) If forecasters think the probability of rising consumer confidence is 0.70, what is its expected value? b) What action would have the highest expected value if they

> What affects marketing managers’ hourly wages? To find out, mean hourly wages were retrieved from the U.S. Bureau of Labor Statistics for two managerial occupations in marketing (Sales managers, Advertising managers) for a random sample

> For the product launch decision of Exercise 12, the economy isn’t looking that good. Your very cautious boss says that he thinks there’s a 60% chance of low sales, and a 30% chance of moderate sales. Which course should the company follow?

> For the decision of Exercise 11, you’ve just learned that you are on the short list and now estimate the chance that you’ll be called for an interview is 0.70. Does that change your choice of actions?

> An analyst for the company in Exercise 12 thinks the probabilities of high, moderate, and low sales are 0.2, 0.5, and 0.3, respectively. In this case calculate the expected value of each action. Which is the best action in this case?

> If you think the probability of being called for an interview is 0.30, calculate the expected value of each action in Exercise 15. Which is the better action in this case?

> Construct a decision tree for the payoff table in Exercise 12.

> Construct a decision tree for the payoff table in Exercise 11.

> An investment bank is thinking of investing in a start-up alternative energy company. They can become a major investor for $6M, a moderate investor for $3M, or a small investor for $1.5M. The worth of their investment in 12 months will depend on how the

> After a series of extensive meetings, several of the key decision-makers for a small marketing firm have produced the following payoff table (expected profit per customer) for various advertising strategies and two possible states of the economy. Cons

> A small company has the technology to develop a new personal data assistant (PDA), but it worries about sales in the crowded market. They estimate that it will cost $600,000 to develop, launch, and market the product. Analysts have produced revenue estim

> You are planning a trip home at the end of the semester and need to make plane reservations soon. However, you’ve just had a preliminary interview with a consulting firm that seemed to go very well. There’s a chance that they will want you to stay for a

> An experiment on laboratory rats finds that rats that are randomly assigned to higher levels of noise take longer to finish a maze than those that try the same maze under less noise. The P-value for the hypothesis of equal means is 60.0001. Are researche

> Major League Baseball (MLB) requires that a ball used in a major league game weigh between 5 and 5.25 oz. (www.MLB.com). Rawlings® is the official supplier of baseballs for MLB. In their production process, do they treat 5 and 5.25 oz. as control or spec

> Instead of one observation outside of 3s from the mean as in Exercise 17, suppose a quality control engineer decides to use only the run chart rule that the system is out of control if 8 observations in a row lie on the same side of the mean. What is the

2.99

See Answer