Which is not true about the telecommunications act of 1996

Assignment Help Basic Computer Science
Reference no: EM13924447

1. __T/F__ Under the rate-of-return regulation, plant depreciation is handled by subtracting the depreciation from the rate base and by the application of return on capital investment.

a. True
b. False

2. Only _________ can override FCC's initiatives, rules, regulations and policies

a. States
b. Congress

3. __T/F_ One way to provide additional revenues for the RBOCs in the MFJ was to retain control of the Yellow PagesPage 2 of 6

a. True
b. False

4. _T/F___CSS7 gave phone companies the ability to add new features without adding any additional equipment costs

a. True
b. False

5. __T/F__ Cross Subsidy is a practice where a firm uses losses from a product or service to offset corporate taxes against gains

a. True
b. False

6. _T/F__ U.S. cable operators are regulated as common carriers for price and carriage, since now they provide telephone, TV and Internet services

a. True
b. False

7. _T/F____ Carriers must obtain a certificate from the FCC prior to the extension of existing lines or construction of new lines, except when 1) the line constitutes part of an interstate line, 2) local, branch, or terminal lines do not exceed ten miles in length, or 3) a line is acquired under Section 221 of the Communications Act.

a. True
b. False

8. _T/F__ The total element long-run incremental cost model is the current attempt by the FCC to implement a rational model for regulating rates

a. True
b. False

9. _______ is responsible for establishing Internet-related LAN standards such as the Wi-Fi specifications

a. W3C
b. IEEE

10. Federal Communications Commission was charted under the Act of ________________

a. 1934
b. 1996

B. Multiple Choice (s).

11. Which of the following is not true about the Telecommunications Act of 1996?

a. Allowed all telephone carriers, utilities, and cable television companies to sell both local and long distance calling.
b. Mandated that the local telephone companies form separate companies to supply connections to companies that competed with them.
c. Deregulated cable TV.
d. Long distance carriers lobbied for the ability to expand sales to offer local services.
e. a) and c)

12. Which of the following communication businesses are not considered common carriers?

a. Broadcasters
b. Cable Operators
c. Internet Service Providers
d. Telephone Companies
e. a), b) and c).

13. Broadcast licenses awarded by the FCC:

a. May not be transferred (sold).
b. May be transferred without FCC approval.
c. May be transferred, but only with FCC approval.
d. May be auctioned off to the highest bidder.
e. a) and c).

14. Which of the following statements are correct.

a. Quality of Service (QoS) is the method by which traffic is prioritized. The parameters of QoS are availability, information transfer accuracy, priority and delay.
b. Network congestion occurs when demand for bandwidth exceeds the bandwidth capability. The congestion can lead to a bottle neck at various nodes on the network or it can also cause packets to get lost.
c. In point-to-multipoint communication the provider can server multiple customers using one line.
d. All of the above
e. a) and c)

15. Which of the following organizations is / are responsible for establishing common network technical specifications and standards for the Internet?

a. Internet Engineering Task Force (IETF)
b. World Wide Web Consortium (W3C)
c. Institute of Electrical and Electronic Engineers (IEEE)
d. All of the above
e. a) and c)

16. Which one of following has the FCC traditionally NOT identified as a policy objective that allegedly leads to the promotion of the public interest?

a. Diversity.
b. Competition.
c. Subsidization.
d. Localism
e. c) and d

17. In order to obtain a broadcast license from the FCC, an applicant must:

a. Be a U.S. citizen, or if a corporation, must be owned mostly by U.S. citizens.
b. Demonstrate adequate financial qualifications to construct and operate a station.
c. Show that they are of good character.
d. All of the above.
e. b) and c)

18. The FCC stipulates that children's television programming must:

a. Be aired at least three hours a week.
b. Not consist of program-length commercials.
c. Contain buffers between commercials.
d. All of the above.
e. b) and c)

19. The Telecommunications Act of 1996 requires:

a. Cable television networks to adhere to safe harbor guidelines for indecent programming.
b. Television set manufacturers to install V-Chips on new sets.
c. Broadcasters to limit the amount of violent programming they air during prime-time viewing hours.
d. All of the above.
e. a) and b)

20. Programming that falls under the FCC's definition of indecency:

a. May only be shown on cable television.
b. May be broadcast on stations during the "safe harbor" from 10 p.m. to 6 a.m.
c. May be shown on cable television without adhering to the safe harbor guidelines that apply to broadcasters.
d. b) and c)
e. a) and b)

Reference no: EM13924447

Questions Cloud

Violation of criminal laws results in penalties : 1. Criminal laws are a protection of society, and the violation of criminal laws results in penalties to the violator such as fines or imprisonment.
Understanding of the cultural similarities and differences : 1.Individually: Select a situation that is currently in the news that involves two or more cultures. Analyze the situation using Hofstede's original four dimensions, plus the universalism/particularism and task/relationship dimensions.
Determine the value of the companys stock : An assisted living home has maintained a dividend payment of $5.25 per share for many years. The same dollar dividend is expected to be paid in future years. If investors require a 11% rate of return on investments of similar risk, determine the valu..
Determine the carrying value of the bond liability : Provide the general journal entry necessary to record the December 31, 2013, interest expense.
Which is not true about the telecommunications act of 1996 : Under the rate-of-return regulation, plant depreciation is handled by subtracting the depreciation from the rate base and by the application of return on capital investment. Which of the following is not true about the Telecommunications Act of 1996...
Bonus-what is its yield to maturity : A large hospital has a bond issue outstanding with seven years remaining to maturity, a coupon rate of 11% with interest paid annually, and a par value of $1050. The current market price of the bond is $1,315.87. What is the bond’s yield to maturity?..
Analyze issue from related to intercultural communication : Compare culture clashes or basic differences that could account for possible miscommunications and propose ways to adapt and overcome such differences to enhance intercultural proficiency in your current role or in a hypothetical situation you dev..
Paper - resistnce to change in healthcare : Conduct research on your topic relevant to interprofessional leadership and the health care field using credible sources ON BELOW TOPIC., TOPIC: RESISTNCE TO CHANGE IN HEALTHCARE
Compute the state transition matrix for system : Compute the state transition matrix for system - Determine the variation of the following functional and calculate the Hessian and show that it is singular at the origin.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create a script that presents a movie guessing game

Use a single script file named Week5.php to display and process the form Can this be done with the movies 8 mile and black swan.

  Define a class for complex number

Define a class for complex numbers. A complex number is a number of the form a + b*i where for our purposes, a and b are numbers of type double, and i is a number that represents the quantity sqrt(-1).

  Question in unix os

What if we need the portion from a text based on some keyword. Now i want the middle portion where i found EO427849242. I tried with sed but it does not give me the desired result.

  Design the static method below to count

Design the static method below to count and return the frequency of each digit in the array of strings.

  Many-to-many relationship

What are some issues when working with a many-to-many relationship? Provide some examples.

  Discuss the future of pki

Discuss the future of PKI and since acceptance of PKI solutions-and product sales-has fallen short of early estimates, what would the "killer app" for PKI applications.

  How is hardware different from software

what is a Web application? What are some features of a Web 2.0 site and how is hardware different from software?

  Write a method that has the radius of the circle passed

Write a method that has the radius of the circle passed into it. It computes the area, and returns the area to the main method.

  How many unique threads are created

Consider the following code segment: pid t pid; pid = fork(); if (pid == 0) { /* child process */ fork(); thread create( . . .); } fork(); a. How many unique processes are created? b. How many unique threads are created?

  Maslow hierarchy of needs

Discuss and explain how the theory designates the team member roles and responsibilities also discuss how Maslow's Hierarchy of Needs applies to professional work dynamics.

  It budget on security

What you need to convey to your CEO is that network attacks are continuing to make the news and organizations have reacted by increasingly spending more of their overall IT budget on security. Business executives are starting to have questions about ..

  Write out that induction proof explicitly

Write out that induction proof explicitly, and also show explicitly how the invariant implies that the greedy satis?ability algorithm is correct.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd