BCIS Final

Data
A student fills out an online admission form to register for a particular course. This is an example of the ________ component of the information system.
Make and manipulate models
Abstract reasoning is the ability to ________.
False
Changing the structure of existing databases causes more organizational disruption than changing working procedures.
Software
An operating system like Windows or Linux is an example of the ________ component of an information system.
True
Information systems become a waste of time and money when users work with inaccurate data.
Additional data
Which of the following is the least critical aspect of good information?
The information that Joanne gave was accurate and sufficient for Caroline’s purpose.
Caroline asks her secretary to send information on the meetings that she needs to attend next month. Her secretary, Joanne, provides her with the details immediately, but leaves out certain additional details that are irrelevant to Caroline’s requirements. Which of the following statements is true about this scenario?
False
According to the five-component framework, additional components are added to the existing component framework as the complexity of a system increases.
It is irrelevant to the subject
Information is considered inefficient if ________.
True
When considering different information systems alternatives, it will be helpful to consider the low-tech versus high-tech alternatives in light of the amount of work that is being moved from people to computers.
False
Information technology and information systems are synonymous terms.
True
Mary processes employee statistics to obtain a meaningful understanding of her organization. The data that she derives by processing becomes information.
Inaccurate
Sandra is a production manager at a soda manufacturer’s bottling plant. She receives a report that contains the list of raw materials stored in the warehouse. She notices that the list also includes items that are not present in the warehouse. The list that she received would not qualify as good information because it is ________.
People
Which of the following is a component of an information system, but not of information technology?
True
Data needs to be sufficient for the purpose for which it is generated.
True
It is likely that desktop and portable computers will disappear in the next decade.
True
The ability to construct and manipulate models is an example of abstract reasoning.
Number of transistors per square inch on an integrated chip doubles every 18 months
According to Moore’s Law, the ________.
True
Information systems differ in the amount of work that is moved from the human side to the computer side.
Procedure
Mark follows certain steps to access the supplementary readings for a course when using his organization’s library management system. These steps that he follows are examples of the ________ component of an information system.
True
Information systems exist to help people who work in an organization to achieve the strategies of that business.
A file of email addresses stored in an email program
Which of the following is an example of a low-tech information system?
Good information should be based on correct and complete data
Which of the following statements is true of good information?
The return on investment of an advertising campaign
Which of the following is considered as information rather than mere data?
Knowledge derived from data
Which of the following is a common description of information?
People and procedures
Which of the following pairs of components constitutes the human side of information systems?
Software
Adobe Acrobat is an application that allows users to create and edit digital documents. This is an example of ________.
Data that arrives after a prolonged period of times is of the highest quality.
Which of the following statements is true about the quality of information?
Instruction on the computer side
Globus Corp. uses a software tool to manage its supply chain. This software tool is an ________ of the company’s information system.
One can buy information technology, but not information systems.
Identify a statement that differentiates information technology from information systems.
False
Data refers to the knowledge derived from information.
Changing reporting relationships
Which of the following would be the most disruptive to an organization when implementing an information system?
True
Information systems become a waste of time and money when users work with inaccurate data.
True
Because of Moore’s Law, any routine skill is liable to be outsourced to the lowest bidder.
True
Data accuracy is a critical requirement for good information.
False
According to the five-component framework, additional components are added to the existing component framework as the complexity of a system increases.
False
Information technology is an assembly of hardware, software, data, procedures, and people that produces information.
Irrelevant
The CEO of an organization asks the human resources manager to send information about the rate of employee turnover in the organization for the last quarter. The manager sends the salary details of new hires during this period. This information is likely to be of little use to the CEO because it is ________.
True
Data accuracy is a critical requirement for good information.
A monitor
Which of the following is an example of computer hardware?
Training the employees to use and manage the new system
Graham & Hilda Corp. is a firm that offers enterprise software solutions to independent retailers. The firm recently entered into a contract with a major national retail chain to develop and implement proprietary software that tracks inventory, restocking, and supplier information. Which of the following actions will be most difficult to perform when implementing the new information system?
Traditional classrooms will be replaced by classroom in a box.
Which of the following statements is true about the changes and developments foreseen by the year 2025?
Information
Which of the following terms is described as processed data or data presented in a meaningful context?
Hardware
The storage controllers in a computer are an example of the ________ component of information systems.
Buying and installing new computers in the new outlets
Drudgen Fitness Inc. is a fitness equipment provider that markets its products through a chain of retail outlets in four states. As part of its expansion strategy, the company decides to open outlets in four more states and decides to revise its existing business processes. According to the five-component model of information systems, which of the following processes will be the least disruptive to the organization?
not freely
In the context of information systems, which of the following statements is true of data characteristics?
abstract thinking
Carlos is a business student doing an internship at Bruno and Venus, a firm specializing in the export of sophisticated equipment to other countries. He finds that he is unable to create a representative chart depicting the relation between processes such as procurement, shipping, and billing. This indicates that he lacks ________ skills.
Information should be just barely sufficient for its purpose
Which of the following statements is true about the quality of information?
True
Project data is data that is part of the collaboration’s work product
False
Margaret finds that calling all her senior supervisors and quality managers for a face-to-face meeting is not feasible. She arranges for a multiparty text chatting session involving all of them. This is an example of asynchronous communication.
Synchronous
________ communication occurs within a team when all team members meet at the same time.
Collaboration
________ is defined as a group of people working together to achieve a common goal via a process of feedback and iteration.
Working together to achieve a common goal.
Collaboration is defined as a group of people ________.
Members provide feedback on each others work
A student group that is working on a project is considered to be a collaboration if the ________.
True
Being a perceptive listener is more important for a collaborator than being gregarious and dynamic.
True
The applications team’s use and the means by which they share data depend on the type of content.
True
Collaboration tools that provide workflow control manage the activities in a process pre-defined by the group.
True
One of the advantages of a team survey is that it is easy to determine who has not yet responded.
Strategic
The need for collaboration is greatest for ________ decisions.
False
A group of four painters, each painting a different wall in the same room, are not working cooperatively.
False
Being a skilled and persuasive presenter is the most important characteristic for an effective collaborator.
True
Project scope and initial budget is set during the starting phase of a project.
True
Team members need not continually check the SharePoint task list for new tasks.
Managerial
Departmental heads should determine the computer hardware and programs that are needed for their department. This is an example of a(n) ________ decision.
Google tracks documents revisions, with brief summaries of changes made
Which of the following statements is true about working with Google Drive?
Skillfulness at giving/receiving negative feedback
Which of the following is the most important trait that an effective collaborator should have?
Deciding to open a centralized distribution system
Which of the following is an example of a strategic decision?
True
In version control systems, the shared directories used to store shared documents are called libraries.
Planning
A project manager defines the tasks that her team members have to perform and determines the schedule for carrying out each of the tasks. This project is in the ________ phase of project management.
Design Document
Which of the following is an example of project data?
Operational
_______ decisions are the most structured and have very little need for collaboration.
Making decisions
Identify a primary purpose of collaboration.
Managerial
Departmental heads should determine the computer hardware and programs that are needed for their department. This is an example of a(n) ________ decision.
False
A webinar is a tool used to facilitate asynchronous communication.
False
Project plan and budget are prepared during the finalizing phase of project management.
True
Feedback and iteration enable a group to produce something greater than any single person could accomplish by working independently.
True
29 An unstructured decision process is one for which there is no agreed-on decision-making method.
WebEx
________ is a popular commercial webinar product used in virtual sales presentations.
Day-to-day activities
Operational decisions are those that support operational ________.
True
Task descriptions need to be specific and worded so that it is possible to decide whether or not the task was accomplished.
False
With Google Drive, documents are stored on the user’s computer.
False
The purpose of the planning phase of project management is to accomplish project tasks.
True
Informing is the first and most fundamental collaboration purpose.
False
Strategic decisions are typically not collaborative.
False
Operational decisions require a high degree of collaboration.
Operational
________ decisions are those that support broad-scope, organizational issues.
Microsoft Lync
Which of the following is a comprehensive tool for communication?
Google Grid allows simultaneous edits
Which of the following statements is true of sharing a task list on Google Grid?
False
Files placed on Google Drive can be accessed only by user with an Gmail address
Operational decisions
________ decisions are concerned with day-to-day activities.
deciding to open a centralized distribution system
Which of the following is an example of a strategic decision?
Determine who will do what and by when
The main purpose of the planning phase in a project is to ________.
True
The applications team’s use and the means by which they share data depend on the type of content.
Synchronous
________ communication occurs within a team when all team members meet at the same time.
Structured
An organization uses a formula to compute the reorder quantity of an item in inventory. This is an example of a(n) ________ decision process.
think its finalizing
A project manager defines the tasks that her team members have to perform and determines the schedule for carrying out each of the tasks. This project is in the ________ phase of project management.
False
A shared file server is best suited for sharing content when there is increased risk of interference with the user’s work by other team members.
True
In version control systems, the shared directories used to store shared documents are called libraries.
Unstructured
A company’s top managers meet to decide on a potential merger with one of its competitors. They discuss various aspects of the merger, such as business valuations and conducting due diligence. This is an example of ________ decision making.
The utilization of resources
Managerial decisions are decisions about ________.
Unlike cooperation, collaboration emphasizes iteration and feedback
Which of the following is a key difference between collaboration and cooperation?
True
An unstructured decision process is one for which there is no agreed-on decision-making method.
They keep the discussion from getting off track
Discussion forums are better suited than emails in asynchronous communication because ________.
False
Microsoft Lync is an example of a comprehensive content-sharing collaboration tool.
True
The sales process involves sales and marketing as well as outbound logistics activities.
Within an industry segment
Focused cost leadership is observed when a product has the lowest cost ________.
False
Establishing alliances with other organizations increases purchasing costs, though these alliances do provide competitive advantages.
False
Information systems create competitive advantage by providing support to a product rather than by becoming a part of the product
False
Inbound logistics constitute support activities in the value chain of manufacturing firms.
Bargaining power
According to Porter’s five forces model, a group of grain farmers in a surplus year will have reduced ________.
True
Creating a new product to increase margin is an example of using product implementations to achieve competitive advantage.
A Houston-based vendor that is the only supplier of a patented material for many smartphone manufacturers
According to Porter’s five forces model, in which of the following situations would a supplier have the highest bargaining power?
Locking in customers
FunText is a company that owns an app used for text messaging. It recently offered a membership extension of six months without any additional charges to its existing customers who had registered for a three-year membership. By doing this, which competitive strategy did FunText implement?
False
In the value chain, customer service is concerned with inducing buyers to purchase the product and providing a means for them to do so.
True
In the context of Porter’s five forces model, the bargaining power of grain farmers in a surplus year is an example of a weak market force.
Linkages
A service company checks the availability of resources before planning its projects. This activity can be classified under ________.
True*
Organizations can lock in customers by making it difficult or expensive for them to move to another product.
False
Organizations cannot gain a competitive advantage by enhancing existing products or services.
Sales and marketing
Which of the following value chain activities involves inducing buyers to purchase a product and providing a means for them to do so?
True
Porter defined value as the amount of money that a customer is willing to pay for a resource, product, or service.
True
In a manufacturing business, the materials ordering process transforms cash into a raw materials inventory.
True
To determine if an information system delivers net savings in costs, the cost of developing and operating the information system will need to be offset against the gains in reduced errors and reduced costs for paper, ink, and printing.
Customer service
Which of the following value chain activities involves assisting users with handling of the products after sale, thus maintaining and enhancing the products’ value?
False
A major drawback of Porter’s five forces model is that it ignores the rivalry among firms in the industry.
False
Establishing alliances with other organizations increases purchasing costs, though these alliances do provide competitive advantages.
True
In the context of Porter’s five forces model, the bargaining power of grain farmers in a surplus year is an example of a weak market force.
Raise the barriers to market entry
Which of the following principles of competitive advantage is related to process implementations?
False
A furniture manufacturer delivers products to his customers’ houses. This is an example of inbound logistics.
Making it easy to work with the organization
Organizations can lock in suppliers either by making it difficult to switch to another organization or by ________.
False
Outbound logistics refers to transforming inputs into the final product.
False
The competitive strategy of a organization is determined by its value chain
True
Employees often resist changes in business processes.
Sales process
In a manufacturing business, which of the following transforms finished goods into cash?
Total margin
The difference between the total value added and the total costs incurred is called the ________ of the value chain.
Differentiating service offerings
Which of the following principles of competitive advantage is associated with product implementations?
High levels of rivalry
The automobile industry is characterized by many manufacturers and intense competition among them. According to Porter’s five forces model, this statement illustrates ________.
True
In the inbound logistics activity of a value chain, the manufacturer receives, stores, and disseminates inputs to a product.
Introduced product differentiation
Streamtech, a manufacturer of automobiles, recently received a patent for an unmanned search boat. By doing this, Streamtech has ________.
Receiving and distributing inputs to the product
Which of the following is a primary activity in the value chain?
Switching costs
Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________.
Inbound logistics
A retail company sells products such as agricultural produce and consumer products. The company procures materials from farmers and local producers. This process of obtaining the inputs needed for a business is called ________.
Industrial products
Bargaining power of customers is likely to be the highest for markets involving ________.
Business process
A(n) ________ is a network of activities that generate value by transforming inputs into outputs.
True
The total margin of the value chain is the difference between the total value added and the total costs incurred.
Reduce costs
Which of the following principles of competitive advantage is related to process implementations?
The policy appears to be permissive without actually being so.
Which of the following is an advantage to an organization if its BYOD (bring your own device) policy holds the employee responsible for any kind of damage?
True
The policy appears to be permissive without actually being so.
True*
As predicted by Moore’s Law, CPU speeds continually increase.
False
The CPU stores the results of computations on the hard drive.
True
A server is a computer that is designed to support processing from many remote computers and users.
Java
Android applications are developed using ________ programming language.
Just-in-time data
________ refers to data delivered to the user at the precise moment it is needed.
True
Random access memory is volatile.
True
Internet of Things (IoT) is one of the disruptive forces that change the power of business, allowing objects to connect to the Internet so they can interact with other devices, applications, or services.
Main Memory
The CPU stores the results of computations in ________.
False
Android is a nonmobile client operating system.
True
As predicted by Moore’s Law, CPU speeds continually increase.
True
Desktop computers and Xboxes are not mobile devices.
False
The CPU of a computing device stores data and programs.
False
Horizontal-market applications are developed for specific, unique needs of an industry.
True
A BYOD (bring your own device) policy is a statement concerning employees’ permissions and responsibilities when they use their own device for organizational business.
False
Symbian is a popular operating system used on devices like iPhone, iPad, and iPod Touch.
ARM
Which of the following is a computer architecture and instruction set that is designed for portable devices such as phones and tablets?
That is written by humans
Source code is computer code ________.
False
Object-oriented languages cannot be used to create difficult and complex applications.
False
An operating system is a hardware device used to input data into a computer.
False
Mac OS and iOS applications are constructed using Java programming language.
True
If an organization’s BYOD (bring your own device) policy dictates that an employee is responsible for damage, the advantage to the organization is that it appears to be permissive without actually being so.
False
Volatile memory devices can store data without using external power.
Nonmobile client operating systems are used on personal computers.
Which of the following statements is true about operating systems?
Magnetic disk
Which of the following is an example of storage hardware in computers?
a smartphone
Which of the following is an example of storage hardware in computers?
desktop virtualilzation
In ________ process, a server hosts many versions of desktop operating systems.
True*
A dual processor computer with 3.5 gigahertz or more is required to edit large pictures, sound, or video files.
False
The term “open source” means that the source code of the program is not available to the public.
True
Native applications are also known as thick-client applications.
True
Object-oriented languages can only be used by professional programmers who have devoted years to learning object-oriented design and coding skills.
False
Horizontal-market applications are developed for specific, unique needs of an industry.
10,240
10 TB is equivalent to ________ gigabytes.
vertical-market application software
DenTimes, a software package installed in hospitals, is used to schedule appointments and bill patients. DenTimes is an example of ________.
Native
________ applications are programs that are written to use a particular operating system.
False
Mobile systems users can move geographically but are restricted from moving between devices.
reduction in car insurance cost
fewer accidents take place
Which of the following statements is true about self-driving cars?
False
The term “open source” means that the source code of the program is not available to the public.
The organization can sniff employees’ mobile traffic.
Which of the following is an advantage to an organization if its BYOD (bring your own device) policy offers wireless network to mobile devices?
optical disk
Which of the following is an example of nonvolatile memory?
cannot be modified by humans
is written by humans
cannot be processed by computers
Machine code ________.
They only run on the operating system for which they are programmed.
Which of the following statements is true about native applications?
Firmware
________ is installed into special, read-only memory of devices like printers and print servers or devices used for various types of communication.
available to the public
The term “open source” means that the source code of the program is ________.
internet explorer
A thin-client application is designed to run within a program such as ________.
are easy to represent physically
Bits are used for computer data because they ________.
application software
Programs that perform business functions, such as general ledger and accounting tasks, are examples of ________.
ubuntu
Which of the following is an example of an open-source desktop operating system?
a thin-client application
A client-server application that requires nothing more than a browser is called ________.
column or group of columns that identifies a unique row in a table
A primary key in a database is a ________.
True
A database is a self-describing collection of integrated records.
False
The easiest time to change the database structure is after the data modeling stage.
Normalization
________ is the process of converting a poorly-structured table into two or more well-structured tables.
small oval
Which of the following notations in an E-R diagram means that the entity is optional and a relationship need not have an entity of that type?
logical representation of database data
A data model is a ________.
N:M
A student management system allows students to have multiple majors, and advisers are assigned to handle multiple students and courses. This is an example of a(n) ________ relationship.
query
A(n) ________ is a request for data from a database.
Forms
________ allow users to read, insert, modify, and delete data in a database.
crow’s feet
The forked lines on the lines representing relationship between two related entities are referred to as ________.
Minimum cardinalities
________ in an E-R diagram refer to the least number of entities required in a relationship.
True
A key is a column or group of columns that identifies a unique row in a table.
True
A data model describes data and relationships that will be stored in the database.
add a foreign key to one of the tables
When using the relational model to represent two tables, one must ________.
data that describe data
Metadata are ________.
data model
An administrator should create a ________ before developing the database design.
True
A database management system (DBMS) is a program used to create, process, and administer a database.
data integrity problem
In a database, when data items are inaccurate and inconsistent with one another, it leads to a(n) ________.
False
1:N, N:M, and 1:1 are common examples of minimum cardinalities, where N and M represent many relationships for two different entities.
evaluating an application design
Which of the following is a developmental task of database administration?
True
A database application is a collection of forms, reports, queries, and application programs that serves as an intermediary between users and database data.
BigData
______ refers to data collections that are characterized by huge volume, rapid velocity, and great variety.
bytes
In a database, ________ are grouped into columns.
True
An identifier is an attribute or a group of attributes whose value is associated with one and only one entity instance.
True
Metadata refers to special data that describe the structure of a database.
The application, the DBMS, and the database all reside on the user’s computer.
Which of the following is true of single-user databases?
Access
Which of the following is an example of a database management system?
False
Normalization is the process of combining two or more tables into a single table.
records
The rows in a database are called ________.
Users
_______ are the final judges as to what data the database should contain and how the records in that database should be related to one another.
SQL
Which of the following is an international standard language for processing a database?
database application
A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data.
small oval
Which of the following notations in an E-R diagram means that the entity is optional and a relationship need not have an entity of that type?
entities
Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle. Brad wants to track information such as task name, productivity of an employee on a daily basis, and employee name. These aspects that Brad wants to track are called ________.
attributes
Entities in a data model have ________ that describe the characteristics of the entity.
True
In single-user databases, the application, the DBMS, and the database all reside on the user’s computer.
data integrity problem
In a database, when data items are inaccurate and inconsistent with one another, it leads to a(n) ________.
processing operations
The data in a database are modified and deleted. These operations of a DBMS are known as ________.
byte
Which of the following is the smallest element in a database?
creating a table for each entity
Identify the first step in transforming a data model into a relational database design.
data are duplicated in a database
A data integrity problem will occur only if ________.
False
Changing a relationship from one-to-many to many-to-many in a functional database is simply a matter of changing the N:N notation to N:M.
True
Attributes are used to describe characteristics of entities.
True
The general goal of normalization is to construct tables such that every table has a single topic or theme.
development
Identify the type of task performed by a database administrator when validating the data model to be used in a database management system.
vertical bar
In an E-R diagram, a(n) ________ on a line means that at least one entity of that type is required.
identifier
Each entity in a database has a unique attribute called a(n) ________.
primary key
Albert creates a relational database to store employee performance statistics. He stores each employee’s data in independent rows and creates a column named “Employee Number” to assign a unique number to each employee. This column is referred to as a ________.
True
A key is a column or group of columns that identifies a unique row in a table.
Database design
________ is the process of converting a data model into tables, relationships, and data constraints.
False
Each table in a database must have two or more primary keys.
False
Creating a system to record and manage the resolution of problems is the development task of a database administrator.
A VPN client software encrypts messages to ensure secure transmissions.
Which of the following statements is true about a VPN?
layered protocol
To enable a seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used.
ftp
Which of the following TCP/IP application-layer protocols is used to move files over the Internet and maintain Web sites?
URL
The address bar reads “http://www.baron-olufsen.com/” when one visits the Web page of the luxury brand Baron & Olufsen. This information in the address bar is the ________ of the Web page.
advent of virtualization
Which of the following factors makes cloud-based hosting advantageous today?
False
All the computers on a LAN use many public IP addresses.
True
IEEE LAN protocols always start with the numbers 802.
WAN
Computers that reside in different geographic locations are connected using a(n) ________.
user
The ________ tier of the three-tier architecture consists of computers, phones, and other mobile devices that have browsers that request and process Web pages.
switch
A ________ detects the speed that a given device can handle and communicates with it at that speed.
A LAN connects computers in a single location.
Which of the following features distinguishes a LAN from a WAN?
True
An intranet is a private internet that is used exclusively within an organization.
control of data location
Identify a characteristic of in-house hosting.
The value of local mediocrity would decrease.
Which of the following would be a consequence of teleaction, a form of remote action systems?
True
The cloud is defined as the elastic leasing of pooled computer resources over the Internet.
Amazon S3
Which of the following is an example of IaaS?
Web servers
Server farms
Web browsers
____ are programs that run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients.
It allows speeds of up to 1.3 Gbps.
It is also known as Ethernet.
It is used for wired LAN connections.
Which of the following statements is true about the IEEE 802.11ac protocol?
IEEE 802.11
IEEE 802.11ac
IEEE 802.3
The ________ protocol standard is also known as Ethernet.
True
Cloud resources are pooled because many different organizations use the cloud to share hardware through virtualization.
A VPN network does not provide users with remote access.
A VPN connection utilizes private networks instead of the public network.
A VPN client software encrypts messages to ensure secure transmissions.
Which of the following statements is true about a VPN?
virtual private network
three-tier system
layered protocol
To enable a seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used.
ftp
Which of the following TCP/IP application-layer protocols is used to move files over the Internet and maintain Web sites?
URL
The address bar reads “http://www.baron-olufsen.com/” when one visits the Web page of the luxury brand Baron & Olufsen. This information in the address bar is the ________ of the Web page.
advent of virtualization
Which of the following factors makes cloud-based hosting advantageous today?
False
All the computers on a LAN use many public IP addresses.
True
IEEE LAN protocols always start with the numbers 802.
XML
WAN
LAN
Computers that reside in different geographic locations are connected using a(n) ________.
user
The ________ tier of the three-tier architecture consists of computers, phones, and other mobile devices that have browsers that request and process Web pages.
codec
switch
modem
A ________ detects the speed that a given device can handle and communicates with it at that speed.
A LAN connects computers in a single location.
Which of the following features distinguishes a LAN from a WAN?
True
An intranet is a private internet that is used exclusively within an organization.
control of data location
Identify a characteristic of in-house hosting.
The value of local mediocrity would decrease.
The requirement for highly skilled employees would decrease.
The industries producing high value products would be unable to properly utilize teleaction.
Which of the following would be a consequence of teleaction, a form of remote action systems?
True
The cloud is defined as the elastic leasing of pooled computer resources over the Internet.
Amazon S3
Which of the following is an example of IaaS?
Web servers
Server farms
Web browsers
____ are programs that run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients.
It allows speeds of up to 1.3 Gbps.
It is also known as Ethernet.
It is used for wired LAN connections.
Which of the following statements is true about the IEEE 802.11ac protocol?
IEEE 802.11
IEEE 802.11ac
IEEE 802.3
The ________ protocol standard is also known as Ethernet.
True
Cloud resources are pooled because many different organizations use the cloud to share hardware through visualization.