Exam 22: Remote, Nomadic, and Mobile Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Define remote access.Give examples of the use of remote access systems.

(Essay)
4.9/5
(47)

Drones and other unoccupied military equipment are examples of remote systems.

(True/False)
4.8/5
(38)

Which of the following is the most likely consequence of communication at a distance?

(Multiple Choice)
4.9/5
(34)

Define nomadic and mobile access systems with an example.

(Essay)
4.8/5
(30)

Client virtualization ________.

(Multiple Choice)
4.9/5
(40)

One likely consequence of communication at a distance is an increase in business travel.

(True/False)
4.8/5
(44)

Which of the following is an example of action at a distance?

(Multiple Choice)
4.8/5
(27)

With nomadic access,users access networks while travelling from site to site.

(True/False)
4.8/5
(37)

Client virtualization is also called network virtualization.

(True/False)
4.8/5
(46)

With client virtualization,the virtual machine hosts multiple instances of a client,instead of hosting multiple operating systems.

(True/False)
4.9/5
(43)

Summarize the impact of widely available nomadic and remote access on business and work style.

(Essay)
4.9/5
(33)

Which of the following is a possible consequence of action at a distance?

(Multiple Choice)
4.8/5
(33)

With ever-increasing communication at a distance,more and more routine work will flow to the lowest bidder.

(True/False)
4.9/5
(40)

Client virtualization enables users to run their desktop on different computers.

(True/False)
4.9/5
(39)

Mobile access is the ability to provide computer-based activity or action at a distance.

(True/False)
4.7/5
(44)

Define a virtual machine.

(Essay)
4.8/5
(42)

Which of the following is an example of mobile access?

(Multiple Choice)
4.7/5
(39)

________ can be divided into two categories: Communication at a distance and action at a distance.

(Multiple Choice)
4.8/5
(30)

Each hosted operating system is called a virtual machine and each such machine has no control of the assets it is assigned.

(True/False)
4.8/5
(33)

A business traveler who accesses networks at work from a hotel or an airport lobby is using nomadic access.

(True/False)
4.7/5
(37)
Showing 21 - 40 of 40
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)