STUDENT ASSIGNMENTS Checkpoint The Checkpoint exercises test your knowledge of the module concepts. True/False Mark T for True and F for False. If False, rewrite the statement so that it is True. 1. All types of computers and mobile devices serve as sending and receiving devices in a communications system. 2. Files on an intranet also are accessible from the Internet. 3. Disadvantages of BANs include data validity and security. 4. A peer-to-peer (P2P) network typically connects fewer than 10 computers. 5. Voice and video calling require large amounts of bandwidth. 6. UWB requires line-of-sight transmission, so its technology is not as widespread as IrDA. 7. For successful communications with NFC devices, the devices or objects must touch or be placed within an inch or two of each other. 8. DSL transmits on existing standard copper phone wiring. 2. Large corporations, phone networks, the Internet, and other networks with large amounts of traffic use DSL. 10. A broadband modem is a communications device that converts digital signals to analog signals and analog signals to digital signals, so that data can travel along an analog phone line. 11. Although some routers may be able to connect more than 200 wired and/or wireless computers and mobile devices, the performance of the router may decline as you add connections. 12. With satellite Internet connections, uplink transmissions usually are slower than downlink transmissions. TAIT ASSIGNMENTS The Checkpoint exercises test your knowledge of the module concepts. Checkpoint True/False Mark T for True and F for False. if false, rewrite the statement so that it is true. 1. In a data hierarchy, each higher level of data contains one or more items from the lower level. 2. A check digit often confirms the accuracy of a primary key value. 3. In a typical database system, each department or area within an organization has its own set of files. 4. In a file processing system, duplicated data can increase the chance of errors. 5. Many programs today use forms on a webpage as their front end. 6. File processing systems require more memory, storage, and processing power than a database. 7. To retrieve or select data in a database, you query it. 8. Unlike a form, you use a report writer only to retrieve data. 9. One way to secure a database is to allow only administrators to have access to create and delete tables. 10. In a rollforward, the DBMS uses the log to undo any changes made to the database during a certain period, 11. Gantt charts are better suited than PERT charts for planning and scheduling large, complex projects. 12. The planning phase begins when the steering committee receives a project request