A large hotel chain wants to conduct targeted marketing promotions using zip code data it collects from its guests when they chock in When the company analyzes the zip code data, they discover that many of the zip codes are 99999. This occurred because the clerks were not asking customers for their zip codes, but they would enter something to complete the registration process. This is an example of unacceptable a. data storage b. data integration c. metadata d. data quality e. source systems The transmission capacity of a network measured in bits per second, is called its a. NetCap b. protocol c bandwidth d. broadband e. narrowband If you were to connect two or more devices within the same building so that every device on the network could communicate with every other device, you would typically use a a. backbone network b. local-area network c. wide-area network d. personal-area network e. metropolitan-area network If you were to connect multiple local are World Wide Web model networks using a common carrier such as AT&T, you would typically use a a backbone network b. local-area network c. wide-area network d. personal-area network e. metropolitan-area network Corporate _____ are high-speed central networks to which multiple smaller networks connect. a. backbone networks b. local-area networks c. wide-area networks d. personal-area networks e. metropolitan-area networks _____ is typically used as the backbone for network, whereas _____ connects the backbone to individual devices on the network. a. Twisted-pair wire, fiber-optic cable b. Coaxial cable, fiber-optic cable c. Twisted-pair wire, coaxial cable d. Fiber-optic cable, twisted-pair wire e. Wi-Fi, fiber-optic cable The nodes in a network work together by adhering to a common set of rules and procedures, known as a(n) _____ a. TCP/IP b. protocol c. Wi-Fi d. WWW e. HTTP The Internet would not be possible without the data communication protocol called a. EDI b. HTTP c. TCP/IP d. URL e. WWW Breaking up a message into small components transmitting each component along a different route, and assembling the pieces at destination known as the a. client-server model/architecture b. Internet model c. TCP/IP model d. packet-switching model e. World Wide Web model One computer requesting a file from another computer, and the second computer transmit that file, is known as the a. client-server model/architecture b. Internet model c. TCP/IP model d. packet-switching model e. World Wide Web model In the _____ model, each computes access all the files on all the other computer a packet-switching d. intranet e. extranet