Exam 13: Internet and Distributed Application Services

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

​____ describes an architectural approach in which an organization rents access to system software and hardware on which it installs its own application software and other services.

(Multiple Choice)
4.9/5
(31)

In a three-layer architecture, the ____________________ layer manages stored data, usually in databases.

(Short Answer)
4.7/5
(35)

​In large networks, responsibility for maintaining directory content and answering queries is centralized to a few individuals who manage the network.

(True/False)
4.9/5
(30)

​SOAP messages can be transmitted by using other protocols, such as FTP and SMTP, but ____________________ is the most common transmission protocol.

(Short Answer)
4.8/5
(26)

​LDAP defines several standard container object types, including Country (C), Organization (O), and Organizational Unit (OU).

(True/False)
4.8/5
(28)

​Web resources are identified and accessed via a(n) ____________________.

(Short Answer)
4.7/5
(28)

​LDAP queries contain plaintext characters and the syntax is simple and straight forward.

(True/False)
5.0/5
(38)

In a three-layer architecture, the _____ layer accepts user input and formats and displays processing results.

(Multiple Choice)
4.9/5
(36)

​With the ____ protocol, a process on one machine can call a process on another machine.

(Multiple Choice)
4.9/5
(44)

​HTML extends XML to describe the structure, format, and content of documents.

(True/False)
4.8/5
(39)

The term ____ summarizes recent coarse-grained approaches to distributing and accessing software and hardware services across the Internet.

(Multiple Choice)
4.9/5
(39)

​In ____ architecture, the roles of client and server are combined into a single application or group of related applications.

(Multiple Choice)
4.9/5
(27)

The risk of vendor lock-in is lower with SaaS because most vendors use similar virtualization environments.

(True/False)
4.7/5
(31)

​What are the steps in the calling process for a remote procedure call?

(Essay)
4.8/5
(42)

​HTTPS is the "secure" version of HTTP

(True/False)
4.9/5
(33)

____________________ is a secure version of HTTP that encrypts HTTP requests and responses.

(Short Answer)
4.9/5
(30)

____ is an open standard, developed by the World Wide Web Consortium, for distributed object interaction that attempts to address the shortcomings of both CORBA and COM+.

(Multiple Choice)
4.9/5
(41)

A(n) ____ is a standardized, interchangeable software module that is executable, has a unique identifier and has a well-known interface.

(Multiple Choice)
4.8/5
(31)

​Static connections are easy to initialize and maintain.

(True/False)
4.7/5
(34)

​What happens when a resource access request is sent to the local resource locator?

(Essay)
4.8/5
(29)
Showing 41 - 60 of 93
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)