Exam 2: Application Layer
Exam 1: Introduction to Data Communications79 Questions
Exam 2: Application Layer99 Questions
Exam 3: Physical Layer143 Questions
Exam 4: Data Link Layer98 Questions
Exam 5: Network and Transport Layers117 Questions
Exam 6: Network Design76 Questions
Exam 7: Wired and Wireless Local Area Networks141 Questions
Exam 8: Backbone Networks68 Questions
Exam 9: Wide Area Networks77 Questions
Exam 10: The Internet73 Questions
Exam 11: Network Security127 Questions
Exam 12: Network Management69 Questions
Select questions type
In the three-tier architecture, the software on the client computer is responsible for the presentation logic, an application server is responsible for the application logic and a separate database server is responsible for the data access logic and data storage.
(True/False)
4.8/5
(27)
A "thin client" approach places most of the application logic on the client.
(True/False)
4.8/5
(39)
Which of the following is not an example of a mail user agent software package?
(Multiple Choice)
4.8/5
(31)
The two functions of middleware are to: 1) provide a standard way of communicating that can translate between software from different vendors, and 2) manage the message transfer between clients and servers so that clients do not need to 'know' which server contains the application's data.
(True/False)
4.8/5
(33)
The ________________ cloud deployment model provides the highest levels of control, privacy and security.
(Multiple Choice)
4.9/5
(37)
The four general functions of any application program are: data storage, data access logic, application logic and presentation logic.
(True/False)
4.8/5
(32)
An application architecture is the way in which the functions of the application layer are performed solely by the clients in the network.
(True/False)
4.9/5
(29)
The application architecture called the distributed computing model uses the "thick" client approach.
(True/False)
4.9/5
(38)
Web-based e-mail like Hotmail is an example of three-tier client-server architecture that provides access to e-mail messages.
(True/False)
4.7/5
(37)
The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called the _____________________.
(Multiple Choice)
4.9/5
(44)
The ________________ clouds realize the benefits from cloud infrastructure such as speed of deployment) with the added level of privacy and security that private clouds offer.
(Multiple Choice)
4.9/5
(44)
The Simple Mail Transfer Protocol is the least commonly used e-mail standard.
(True/False)
4.8/5
(41)
An application program function is __________, or the processing required to access data.
(Multiple Choice)
4.8/5
(49)
The two-tier e-mail architecture does not require any application software on the client computer.
(True/False)
4.8/5
(30)
Scalability refers to the ability to increase or decrease the capacity of the computing infrastructure in response to changing capacity needs.
(True/False)
4.8/5
(36)
What are the standards SMTP, POP, and IMAP? What roles do SMTP, POP, and IMAP play in sending and receiving email on the Internet? What do these acronyms stand for?
(Essay)
4.9/5
(33)
Showing 21 - 40 of 99
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)