Exam 8: Web Server Hardware and Software
The _____ is the part of the TCP/IP rules that defines the formats used to transfer files between TCP/IP-connected computers.
C
Efforts to reduce the environmental impact of large computing installations are called _____ computing.
B
Describe some of the drawbacks of e-mail.
One annoyance associated with e-mail is the amount of time that businesspeople spend answering their e-mail today. Researchers have found that most managers can deal with e-mail messages at an average rate of about five minutes per message. Some messages can be deleted within a few seconds, but those are balanced by the e-mails that require the manager to spend much more time finding facts, checking files, making phone calls, and doing other tasks as part of answering e-mail.
A second major irritation brought by e-mail is the computer virus, more simply known as a virus, which is a program that attaches itself to another program and can cause damage when the host program is activated.
Probably the most frustrating and expensive problem associated with e-mail today is the issue of unsolicited commercial e-mail.
In dynamic page-generation technologies, server-side scripts and HTML-tagged text are used independently to create the dynamic Web page.
When people use Web browser software to become part of the Web, their computers become Web client computers on a worldwide client/server network.
The challenge-response content-filtering technique uses a black list as the basis for a confirmation procedure.
A(n) _____ file is a file on a Web server that is not linked to any page.
In the context of designing a large Website's operations, in a(n) _____ , a few very large and fast computers are used.
In the context of multiple meanings of the term server, the server computer that handles incoming and outgoing e-mail is usually called a(n) _____.
A popular server configuration which involves putting small server computers on a single computer board and then installing many of those boards into a rack-mounted frame. These servers-on-a-card are called _____.
A centralized architecture spreads failure risk over a large number of servers.
A content-filtering technique where the software that performs the filtering task is placed on individual users' computers is called _____.
A(n) _____ is a program that attaches itself to another program and can cause damage when the host program is activated.
Describe the major components of a typical request message from a client to a server.
_____ in the form of programs called Java servlets, is a technology which is used to create dynamic Web pages.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)