Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
107 Cards in this Set
- Front
- Back
Voice over IP server handles telephone calls over Internet Protocol
|
TRUE
|
|
Down-line processor collects data from terminals and sends it over a signle high speed line
|
true
|
|
IT Managers should prefer switches over hubs
|
true
|
|
A Hub delivers messages in a LAN to a specific computer
|
false
|
|
Data communications is the combination of data processing and
|
telecommunications
|
|
The maximum number of workstations in LAN is 100
|
false
|
|
OTA is a non-profit organization
|
true
|
|
A Workstation is also called
|
node, server (a+b)
|
|
Which of the following is an advantage of Wireless LANs?
I. Simple to setup II. Expensive III. Convenient when wiring is not easy or possible |
I,III
|
|
HTNG's mission is to
|
create standards for hospitality software
|
|
Which of the following is an example of transmission medium for a LAN?
I. Twisted-pair cable II. Cat 5 cable III. Coaxial Cable |
I,III,III
|
|
A printer on a LAN is called "a host"
|
true
|
|
which of the following is an example of network management software functions?
|
configuration and fault management (a+b)
|
|
Which of the following cables has the fastest transmission speed?
|
CAT 5e
|
|
You can create a WAN by using:
I. Dial Up II. ISDN III. DSL IV. Frame Relay |
--> all of the above
|
|
When a new employee joins the organization, which of the network management modules is used to create a new user account?
|
configuration management
|
|
Which of the following is an example of a mission-critical software for a restaurant?
|
POS
|
|
OTA stands for in the context of integration:
|
Open Travel Alliance
|
|
Each Network Interface Card has a unique MAC address
|
true
|
|
The linkage of computer systems by means of communication is called
|
computer network
|
|
multitasking is the ability to open and work with several programs at once, to operate sophisticated software applications, to support multiple users accessing programs and data at the same time, and to work with powerful operating systems such as UNIX, linux, and windows vista server
|
TRUE
|
|
when you get an unexpected attachment in an email form someone that you know you should
|
send a separate email to the sender to verify that the person really intended to send it before you open the attachment
|
|
a magnetic tape and external hard drive or disk array has an unlimited life expectancy
|
false
|
|
people pose the greatest threat to maintaining the integrity of an information system
|
true
|
|
anti-virus software definition files should be updated once a year
|
false
|
|
which of the following is not an example of operator error
|
SOFTWARE ie bugs, poor error handling
|
|
the higher the hard disks RPM, the slower the hard drive can locate and send requested data
|
FALSE
|
|
what are the common causes of system failure?
I. Operator failure II. Hardware failure III. Power problems IV. software bugs V. System overload VI: viruses VII: spyware |
all of the above!!
|
|
do not use vendor provided username and password is one of the PCI requirements
|
true
|
|
which of the following is not true about UPS
|
it acts as a storage area network
|
|
the main purpose of PCI DSS is to
|
require merchants to comply with data security standards
|
|
PCI DSS stands for
|
payment card industry data security standards
|
|
which of the following is an example of things that computer viruses can do?
-cause comp to crash -send fraudulent emails -impact comp performance |
all of the above!
|
|
which of the following is an example of basic measures to reduce hardware malfunctions?
-keep temp and relative humidity at appropriate levels -keep equipment clean -keep tvs away from comps -keep water and corrosive agents away -buy expensive hardware |
i,ii,iv
|
|
a fault tolerant mainframe includes an immediate on-line backup system when a failure occurs
|
true
|
|
which of the following software can remind the schedules for hardware preventive maintenance schedules
|
schedule+ , microsoft outlook
|
|
keylogger is an example of anti-virus software
|
false
|
|
at the corporate level, LAN within the hotel or restaurant is usually connected to the head office or corporate headquarters via some kind of connectivity
|
true
|
|
which is the first step after realizing that a computer is infected with a virus
|
isolate from the network
|
|
PCI DSS is created by
|
major credit card companies such as visa, mastercard
|
|
A SAN is an architecture to attach remote computer storage devices such as disk arrays to servers in such a way that, to the operating system, the devices appear as locally attached.
|
true
|
|
Spyware software can:
I. keep record of users' keystrokes II. keep record of users' screenshots III. keep record of users' web browsing history IV. keep record of computer's RAM usage |
I,II,III
|
|
Which of the following is not an advantage of optical storage over magnetic storage
|
It is faster to read from an optical disk and it is faster to write data to them
|
|
Which of the following measures should be implemented to avoid power disturbances?
I. Surge protection II. Proper wiring and grounding III. Uninterruptible Power Supply |
all of the above
|
|
PCI DSS has
|
12 standards
|
|
When was the first time the first models of telephone systems introduced to the guestroom
|
1972
|
|
in-room entertainment systems can offer:
I. Wake-up call II. Electronic room keys III. On demand movies IV. High speed internet |
I,III,IV
|
|
Automated minibars have a time limit before they post the cost of the item taken to the room folio. What is this time limit
|
determined by each hotel
|
|
Automated minibars can generate the following reports:
• Items consumed from all hotel rooms • Items consumed from a specific hotel room • Items consumed from a specific hotel floor • All answers are correct |
all of the above!
|
|
Which of the following is a method of wake-up systems in hotels?
I. Manual wake-up system by hotel operator II. Automated wake-up system by phone III. Automated wake-up system by interactive TV IV. Alarm clock in room |
I,II,III,IV
|
|
Wireless electronic room key locks provides easy access for handicapped guests
|
true
|
|
Automated minibars works in the order of:
• guest check-in/ PMS unlocks minibar/guest take item from minibar/minibar charges to folio/ guest settle the bill/ PMS locks the minibar • guest check-in/ PMS unlocks minibar/guest take item from minibar/minibar charges to folio/ guest settle the bill • guest reserves the room/PMS unlocks minibar/guest take item from minibar/minibar charges to folio |
guest check-in/ PMS unlocks minibar/guest take item from minibar/minibar charges to folio/ guest settle the bill/ PMS locks the minibar
|
|
It was illegal to make profit on telephone calls in hotels before 1981
|
true
|
|
Which of the following is an example to reports that can be obtained from call accounting system?
I. Calls by department II. Calls by extension III. Detailed activity by user |
I,II,III
|
|
VoIP carries human voice on Internet network
|
true
|
|
Mechanical room keys are mostly used in large hotels
|
false
|
|
In a 1000-room full service hotel (i.e.Marriott Hotel), there are more than 60 different systems
|
true
|
|
Guestroom control module has the following devices:
I. alarm clock II. climate control III. weather.com channelI V. electronic locking system |
I,II
|
|
Least cost routing feature of CAS is to detect where the call (extension) is originated in a hotel
|
false
|
|
Energy Management System controls both low-voltage and line-voltage HVAC equipment
|
true
|
|
Mission-critical system in a full-service hotel (i.e. Marriott) refers to:
I. PMS II. POS III. ELS |
all of the above!
|
|
Which of the following is the feature of HOBIC
|
process overflow calls from CAS
|
|
What does HOBIC stand for
|
hotel Billing Information System
|
|
the main advantage of electronic guest room status system is that:
|
it provides information to housekeeping personnel when to make hotel rooms up.
|
|
Biometrics can not be used in hospitality industry
|
False
|
|
Bus topology is the best topology
|
false
|
|
Infrared switch turn on and off the lights at a distance
|
true
|
|
The main advantage of electronic key locking systems with codes is saving money on key cards
|
true
|
|
The linkage of computer systems by means of communication lines or channels (e.g., fiber optic, microwave, satellite, telephone line, 802.11) is called a computer file transfer protocol.
|
false
|
|
Which of the following is true about fiber optic cable?
|
fastest cable and lower signal loss
|
|
Bus topology is the most used topology in hotels.
|
false
|
|
Body heat sensors are ideal in hotel room because:
|
they do not need to be in a visible space
|
|
In-room fax machines are provided as an amenity in every business hotel.
|
false
|
|
LANs share
|
File, Database, Printer (not mouse)
|
|
Which of the following room key is used in hotels extensively
|
stand-alone system
|
|
it was illegal to create LAN in hotels before 1981.
|
false
|
|
Arrangement of workstations in a shared medium environment is called:
|
topology
|
|
PBX and CAS perform the same functions.
|
false
|
|
Call accounting system has all the following functions except
|
wake up service
|
|
For self check-in service, guests do not need to have an advance reservation
|
false
|
|
Which of the following is a feature of electronic key locking systems?
I. Unique keys II. Audit trail capability III. Key code expiration IV. Automated dead-bolt with “Do Not Disturb” |
all of the above!
|
|
It is very easy to calculate cost/benefit analysis in automated minibars.
|
true
|
|
What influences technology needs for hotels?
I. Department needs II. The size of hotel doors III. Service level and customer relationships IV. Facility size and layout |
I,III,IV
|
|
The combination of telecommunications (any system for communicating over a long distance) and data processing is called
|
data communication
|
|
Which of the following is the difference between a hub and a switch?
|
switch transfers data only to targeted computer (destination)
|
|
You can not really tell if automated minibar or traditional minibar is better until you perform a cost/benefit analysis.
|
true
|
|
Brides and routers are optional LAN hardware.
|
true
|
|
PBX manages telephone lines
|
true
|
|
Majority of email messages are spam.
|
true
|
|
Code locks is an example of electronic locking systems
|
true
|
|
One can create a WAN by using dial-up service.
|
true
|
|
HTNG is a non-profit organization that aims to protect the rights of credit card holders
|
false
|
|
Iris scan is a biometric method in electronic locking systems
|
true
|
|
Which of the following facts are true about Wireless LANs?
I. Wireless LANs are hard to set up II. Wireless LANs are cheap to create. III. When it is not possible to wire, Wireless LANs come into rescue. IV. Security is the biggest down side of Wireless LANs. |
II,III,IV
|
|
Ring topology is used mostly by accounting departments in hotels.
|
true
|
|
Which of the following is feature(s) of VoIP?
I. VoIP is a telephone service II. VoIP is cheaper than traditional phone system III.VoIP carries human voice on Internet network |
I,II,III
|
|
Which of the following is an example to reports that can be obtained from call accounting system?
I. Calls by department II. Calls by extension III. Detailed activity by user |
I,II,III
|
|
Smart card is the technology that connects different companies’ systems in GDS.
|
false
|
|
Which of the following device converts digital data into analog data and vice versa?
|
modem
|
|
Energy management system in a hotel room controls:
I. temperature II. humidity III. digital entertainment system IV. automated minibars |
i,ii
|
|
Which of the following is an example to network operating system?
I. Unix II. Linux III. Novell V. Windows XP Pro |
I,II,III
|
|
Self check-in kiosks must be interfaced to:
|
PMS
|
|
The number of hotels offering HSIA is decreasing
|
false
|
|
WAN stands for Wired Area Network
|
false
|
|
The number of travelers who are booking online is increasing every year
|
true
|
|
A LAN must have at least 5 computers
|
false
|
|
Proxy Server
|
performs a function on behalf of other computers
|