Exam 11: Networked Applications

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is true?

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

A

Speech codecs vary with respect to ________.

Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
Verified

C

Users are primarily concerned about the ________ layer.

Free
(Multiple Choice)
4.9/5
(23)
Correct Answer:
Verified

A

If most P2P applications use facilitating servers,why do we still call them peer-to-peer?

(Multiple Choice)
4.9/5
(28)

To be considered a peer-to-peer application architecture,there can be no dedicated servers included on the network.

(True/False)
4.8/5
(34)

Login is done P2P (instead of using servers)in ________.

(Multiple Choice)
4.9/5
(33)

The Skype protocol is relatively ________ for corporate firewalls to filter.

(Multiple Choice)
4.7/5
(38)

In BitTorrent,the group of all connected computers that have all or part of the file to be downloaded is called the ________.

(Multiple Choice)
4.8/5
(33)

Telephones that can plug directly into a VoIP network are called PCs with multimedia hardware and added software.

(True/False)
4.8/5
(32)

An organization that provides cloud services is called a cloud ISP.

(True/False)
4.9/5
(39)

Transient client presence tends to be a problem in ________.

(Multiple Choice)
4.8/5
(36)

Which of the following is not an issue for cloud utility computing?

(Multiple Choice)
4.9/5
(32)

The purpose of ________ is to help someone to find an appropriate service object.

(Multiple Choice)
4.7/5
(37)

The purpose of ________ is to allow a calling program to understand how to use a service object.

(Multiple Choice)
4.9/5
(42)

Which element of the Skype network is in charge of signaling?

(Multiple Choice)
4.9/5
(31)

Antivirus software checks e-mail attachments for ________.

(Multiple Choice)
4.7/5
(39)

In BitTorrent file sharing,you download parts of the file simultaneously from multiple peers.

(True/False)
5.0/5
(35)

Which of the following is a security risk associated with BitTorrent?

(Multiple Choice)
4.7/5
(43)

Which of the following is a processor-sharing application?

(Multiple Choice)
4.9/5
(36)

Which of the following is not one of the main elements of the Skype network?

(Multiple Choice)
4.8/5
(42)
Showing 1 - 20 of 95
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)