Exam 13: Internet and Distributed Application Services
Exam 1: Computer Technology: Your Need To Know60 Questions
Exam 2: Introduction to Systems Architecture90 Questions
Exam 3: Data Representation100 Questions
Exam 4: Processor Technology and Architecture103 Questions
Exam 5: Data Storage Technology100 Questions
Exam 6: System Integration and Performance100 Questions
Exam 7: Input/Output Technology99 Questions
Exam 8: Data and Network Communication Technology100 Questions
Exam 9: Computer Networks75 Questions
Exam 10: Application Development76 Questions
Exam 11: Operating Systems75 Questions
Exam 12: File and Secondary Storage Management77 Questions
Exam 13: Internet and Distributed Application Services93 Questions
Exam 14: System Administration75 Questions
Select questions type
____________________ extends POP3 to permanently store and manage e-mail messages on the server, which enables users to access stored e-mail from any Internet host.
Free
(Short Answer)
4.9/5
(30)
Correct Answer:
Internet Message Access Protocol 4 (IMAP4)
Internet Message Access Protocol 4
IMAP4
All objects in an LDAP schema have a(n) ____ attribute.
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
B
The highest vendor lock-in risk occurs with ____ because the vendor controls all key components of the customer's information system.
Free
(Multiple Choice)
4.7/5
(27)
Correct Answer:
C
In the 1990s, the term ____________________ was coined to describe this design philosophy, partly reflecting the growing dominance of client/server architecture.
(Short Answer)
4.9/5
(47)
Distributing parts of an information system across many computer systems and locations is called ____.
(Multiple Choice)
4.8/5
(31)
A ____ server maintains a registry of names and corresponding IP addresses for each node on the local network.
(Multiple Choice)
4.8/5
(37)
Software implementing the Transport, Internet, and Network Interface layers of the TCP/IP model is commonly called a(n) ____.
(Multiple Choice)
5.0/5
(31)
With ____________________, a customer is forced to continue using a vendor because of high cost or other difficulties in switching.
(Short Answer)
4.9/5
(39)
A web browser can pass parameters to a script on a Web server using the RPC protocol.
(True/False)
4.7/5
(38)
In static resource connections, the ____________________ acts as a router for resource access requests arriving from local and remote users and application programs.
(Short Answer)
4.7/5
(29)
____, a Microsoft specification for component interoperability, has its roots in older Microsoft specifications, including Object Linking and Embedding (OLE) and the Component Object Model (COM).
(Multiple Choice)
4.8/5
(41)
A ____ is a region of shared memory through which multiple processes executing on the same machine can exchange data.
(Multiple Choice)
4.9/5
(36)
A(n) ____________________ is a unique combination of an IP address and a port number, separated by a colon.
(Short Answer)
4.8/5
(37)
____ are composed of software components distributed across many computer systems and geographic locations.
(Multiple Choice)
4.9/5
(35)
Data- and graphics-intensive applications can use ordinary Internet connections as part of SaaS.
(True/False)
4.8/5
(28)
The earliest e-mail protocol is ____________________, which defines how text messages are forwarded and routed between Internet hosts.
(Short Answer)
4.9/5
(36)
As OSs have evolved, they have incorporated fewer and fewer middleware functions.
(True/False)
4.8/5
(34)
____________________ are important in software development because complex programs and applications can be constructed from smaller previously developed parts.
(Short Answer)
4.8/5
(29)
An operating system's primary role is to manage hardware, software, and data resources.
(True/False)
4.7/5
(33)
Active Directory clients rely on a ____ to locate Active Directory servers.
(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 93
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)