Deck 20: Network and Cloud Technology
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/72
Play
Full screen (f)
Deck 20: Network and Cloud Technology
1
A private internet that is used exclusively within an organization is called an intranet.
True
2
An internet is a network of networks that connects local area networks (LANs), wide area networks (WANs), and other internets.
True
3
Which wireless protocol is designed for transmitting data over short distances?
A) optical fiber
B) a hop
C) twisted-pair cable
D) Bluetooth
A) optical fiber
B) a hop
C) twisted-pair cable
D) Bluetooth
D
4
A ________ is a networking device that detects the speed that a given device on a local area network (LAN) can handle and communicates with it at that speed.
A) bus
B) switch
C) domain
D) hub
A) bus
B) switch
C) domain
D) hub
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following statements is TRUE of an Internet service provider (ISP)?
A) It separates the phone signals from computer signals on a digital subscriber line (DSL) at a user's location.
B) It facilitates a one-way information transfer process between a user's computer and the Internet.
C) It allows a user to communicate directly through the Internet without requiring a wireless medium of communication.
D) It provides a legitimate Internet address and serves as a user's gateway to the Internet.
A) It separates the phone signals from computer signals on a digital subscriber line (DSL) at a user's location.
B) It facilitates a one-way information transfer process between a user's computer and the Internet.
C) It allows a user to communicate directly through the Internet without requiring a wireless medium of communication.
D) It provides a legitimate Internet address and serves as a user's gateway to the Internet.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
6
Computers in two separate company sites must be connected using a(n) ________.
A) local area network
B) wide area network
C) commerce server
D) Ethernet
A) local area network
B) wide area network
C) commerce server
D) Ethernet
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
7
Which protocol standard used for wired local area network (LAN) connections specifies hardware characteristics, such as the signal to be carried by each wire?
A) Bluetooth
B) WiMAX
C) Ethernet
D) RuBee
A) Bluetooth
B) WiMAX
C) Ethernet
D) RuBee
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
8
A personal area network ________.
A) is a wireless connection that connects devices belonging to two different people
B) connects devices that are located around a single person
C) has a minimum range of five miles
D) is defined as a network of networks
A) is a wireless connection that connects devices belonging to two different people
B) connects devices that are located around a single person
C) has a minimum range of five miles
D) is defined as a network of networks
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
9
A private internet that is used exclusively within an organization is called a personal area network.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following statements is TRUE of local area network (LAN) protocols?
A) IEEE LAN protocols always start with the numbers 802.
B) The IEEE 802.11 protocol is also called the Ethernet.
C) Wired LANs use the IEEE 802.11 protocol.
D) The IEEE 802.3ac is the current standard for wireless LANs.
A) IEEE LAN protocols always start with the numbers 802.
B) The IEEE 802.11 protocol is also called the Ethernet.
C) Wired LANs use the IEEE 802.11 protocol.
D) The IEEE 802.3ac is the current standard for wireless LANs.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
11
What does the term 10/100/1000 Ethernet in most computer systems indicate?
A) the number of devices that can be connected
B) the distance over which the network signal can be transmitted
C) the rate at which data can be transmitted
D) the Internet protocol used by a system
A) the number of devices that can be connected
B) the distance over which the network signal can be transmitted
C) the rate at which data can be transmitted
D) the Internet protocol used by a system
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
12
Penelope's office uses a wired local area network (LAN) to connect its computers and printers over two floors. Which of the following protocols should it use for its LAN?
A) IEEE 802.3
B) DSL
C) EVDO
D) WiMAX
A) IEEE 802.3
B) DSL
C) EVDO
D) WiMAX
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
13
The distinguishing characteristic of a local area network (LAN) is that it ________.
A) connects computers at multiple locations
B) connects computers at a single location
C) is a network of networks
D) does not require a wired connection
A) connects computers at multiple locations
B) connects computers at a single location
C) is a network of networks
D) does not require a wired connection
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
14
With a wide area network (WAN), an organization can place communications lines wherever it wants because all lines reside on its premises.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following protocols is commonly used for wireless local area networks (LANs)?
A) IEEE 802.11
B) Distributed Data Interface
C) DSL
D) IEEE 802.3
A) IEEE 802.11
B) Distributed Data Interface
C) DSL
D) IEEE 802.3
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
16
A(n) ________ is a set of rules that programs on two communicating devices follow.
A) domain
B) attribute
C) protocol
D) markup language
A) domain
B) attribute
C) protocol
D) markup language
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
17
A ________ is used to provide a seamless flow of data across networks.
A) layered protocol
B) database
C) Web page
D) Web server
A) layered protocol
B) database
C) Web page
D) Web server
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
18
What is the difference between a local area network (LAN) and a wide area network (WAN)? Give an example of how each one could be used in businesses.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
19
The IEEE 802.3 protocol standard is also known as the ________.
A) TCP/IP protocol
B) Ethernet
C) intranet
D) Internet
A) TCP/IP protocol
B) Ethernet
C) intranet
D) Internet
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
20
A(n) ________ connects computers at different geographical locations.
A) local area network
B) wide area network
C) Ethernet
D) Econet
A) local area network
B) wide area network
C) Ethernet
D) Econet
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is a component of the user tier?
A) a computer that has browsers that request and process Web pages
B) a computer that runs Web servers and processes application programs
C) a computer that runs a database management system (DBMS) that processes requests for data from a commerce server
D) a computer that receives Web page requests and sends them to an available server to minimize customer delays in a facility called a Web farm
A) a computer that has browsers that request and process Web pages
B) a computer that runs Web servers and processes application programs
C) a computer that runs a database management system (DBMS) that processes requests for data from a commerce server
D) a computer that receives Web page requests and sends them to an available server to minimize customer delays in a facility called a Web farm
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
22
Samantha is browsing through some geological sites to collect information for a class project. She saves the address of the site she finds most helpful for future reference. The address Samantha saved is also the site's ________.
A) File Transfer Protocol
B) digital subscriber line
C) uniform resource locator
D) Internet service provider
A) File Transfer Protocol
B) digital subscriber line
C) uniform resource locator
D) Internet service provider
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
23
________ are programs that run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients.
A) Content delivery networks
B) Web servers
C) Uniform resource locators
D) Web browsers
A) Content delivery networks
B) Web servers
C) Uniform resource locators
D) Web browsers
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
24
A ________ is a worldwide-unique identity that is affiliated with a public IP address.
A) tag name
B) protocol
C) domain name
D) uniform resource locator
A) tag name
B) protocol
C) domain name
D) uniform resource locator
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
25
A small office or a home office local area network (SOHO LAN) requires more than a dozen computers and printers.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
26
What is Bluetooth? What are its uses?
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
27
What are the three important functions of an Internet service provider (ISP)?
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following statements is TRUE of an IP address?
A) The use of an IP address is limited to the public Internet.
B) An IP address can be associated with just one domain name.
C) The IP address that a domain name points to can be changed.
D) An IP address commonly has either a three-decimal or five-decimal dotted notation.
A) The use of an IP address is limited to the public Internet.
B) An IP address can be associated with just one domain name.
C) The IP address that a domain name points to can be changed.
D) An IP address commonly has either a three-decimal or five-decimal dotted notation.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following statements defines an IP address?
A) It is a protocol that specifies the format of Web pages.
B) It is a number that identifies a particular device.
C) It is a piece of message handled by programs that implement Internet protocol.
D) It is a program that breaks up network traffic into pieces before transmission.
A) It is a protocol that specifies the format of Web pages.
B) It is a number that identifies a particular device.
C) It is a piece of message handled by programs that implement Internet protocol.
D) It is a program that breaks up network traffic into pieces before transmission.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
30
The committee that addresses local area network (LAN) standards is called the IEEE 803 Committee.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
31
Cable lines provide high-speed data transmission using phone lines.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following is the second tier in the three-tier architecture arrangement?
A) presentation tier
B) database tier
C) server tier
D) user tier
A) presentation tier
B) database tier
C) server tier
D) user tier
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
33
The IEEE 802.3 protocol is used for wired local area network (LAN) connections.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following statements is TRUE of cable lines?
A) Cable lines provide high-speed data transmission using telephone cables.
B) Performance of cable lines is stable irrespective of the number of users sending and receiving data.
C) Cable lines use the same protocols used by data transmission lines.
D) The signals from cable lines do not interfere with TV signals.
A) Cable lines provide high-speed data transmission using telephone cables.
B) Performance of cable lines is stable irrespective of the number of users sending and receiving data.
C) Cable lines use the same protocols used by data transmission lines.
D) The signals from cable lines do not interfere with TV signals.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
35
Most personal computers today that support 10/100/1000 Ethernet conform to the 802.3 specification and allow for transmission at a rate of 10, 100, or 1,000 Mbps.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
36
Wireless mice use Bluetooth to connect to a computer.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
37
Users can download data at a maximum speed of 500 Mbps using cable lines.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
38
A digital subscriber line (DSL) operates on the same lines as voice telephones.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following statements is TRUE of digital subscriber lines (DSLs)?
A) They use television lines for data transmission.
B) Their signals do not interfere with voice telephone services.
C) Their operations are independent of voice telephone lines.
D) They do not allow data transmission to occur when telephone conversations occur.
A) They use television lines for data transmission.
B) Their signals do not interfere with voice telephone services.
C) Their operations are independent of voice telephone lines.
D) They do not allow data transmission to occur when telephone conversations occur.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
40
Bluetooth is a protocol that can transmit data over long distances.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
41
How does a Web server differ from a commerce server?
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following statements is TRUE of the JavaScript Object Notation (JSON)?
A) It contains a lot of metadata to validate the format of documents.
B) It is used to transmit voluminous data between browsers and servers.
C) JSON documents can be processed only using the Java programming language.
D) It cannot be used to support Web services.
A) It contains a lot of metadata to validate the format of documents.
B) It is used to transmit voluminous data between browsers and servers.
C) JSON documents can be processed only using the Java programming language.
D) It cannot be used to support Web services.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
43
What is HTTP? How does it work?
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
44
Differentiate between private and public Internet protocol (IP) addresses. Explain the benefits of the private/public IP address scheme.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
45
The movement from one network to another is called a hop.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
46
What are the different tiers in the three-tier architecture used by Web applications?
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
47
The TCP/IP Protocol architecture uses the same protocol in all its layers.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
48
S in https stands for ________.
A) site
B) status
C) speed
D) secure
A) site
B) status
C) speed
D) secure
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
49
The server tier consists of computers that run a database management system (DBMS) that processes requests to retrieve and store data.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
50
The basic plumbing of the Internet is governed by protocols that are defined according to an arrangement called the TCP/IP Protocol architecture.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
51
________ is a common TCP/IP application-layer protocol that is used for email transmissions.
A) eXtensible Markup Language
B) Mail Access Protocol
C) File Transfer Protocol
D) Simple Mail Transfer Protocol
A) eXtensible Markup Language
B) Mail Access Protocol
C) File Transfer Protocol
D) Simple Mail Transfer Protocol
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
52
Google Drive and Microsoft OneDrive use File Transfer Protocol behind the scenes to ________.
A) move files from their cloud to the user's computer
B) balance server loads
C) format files and encode them to be machine readable
D) manage network traffic
A) move files from their cloud to the user's computer
B) balance server loads
C) format files and encode them to be machine readable
D) manage network traffic
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following statements is TRUE of protocols supporting Web services?
A) SOAP is a lower-level Internet protocol.
B) XML is preferred for transmitting large volumes of data between servers and browsers.
C) WSDL documents are read by developer tools to configure a programming environment.
D) The metadata in JSON is well-suited for validating the format and completeness of the document.
A) SOAP is a lower-level Internet protocol.
B) XML is preferred for transmitting large volumes of data between servers and browsers.
C) WSDL documents are read by developer tools to configure a programming environment.
D) The metadata in JSON is well-suited for validating the format and completeness of the document.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following statements is TRUE of Web servers?
A) They typically perform the functions of tracking and managing the products in a database.
B) They are part of the user tier in the three-tier architecture.
C) They are used only to send and receive Webmail.
D) They send and receive Web pages to and from clients.
A) They typically perform the functions of tracking and managing the products in a database.
B) They are part of the user tier in the three-tier architecture.
C) They are used only to send and receive Webmail.
D) They send and receive Web pages to and from clients.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
55
What is a domain name? What is the procedure to get a domain name?
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
56
What is the TCP/IP Protocol architecture? Where are the various application-layer protocols?
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
57
The user tier consists of computers, phones, and other devices.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following purposes does a Hypertext Transport Protocol (http) serve?
A) determining the IP address of devices on a network
B) providing a reliable network for data communication
C) enabling communication between a browser and server
D) dividing network traffic into packets
A) determining the IP address of devices on a network
B) providing a reliable network for data communication
C) enabling communication between a browser and server
D) dividing network traffic into packets
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
59
________ is a language used for transmitting documents in Web services and the cloud.
A) HyperText Markup Language
B) Web Services Description Language
C) Structured Query Language
D) eXtensible Markup Language
A) HyperText Markup Language
B) Web Services Description Language
C) Structured Query Language
D) eXtensible Markup Language
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following statements is TRUE of service-oriented architecture (SOA)?
A) Work is assigned to Web servers based on their geographical proximity to a user.
B) SOA services are used only between the Web server and the users.
C) The number of database servers and Web servers should be in a fixed ratio.
D) JavaScript is written to invoke services defined by a server application.
A) Work is assigned to Web servers based on their geographical proximity to a user.
B) SOA services are used only between the Web server and the users.
C) The number of database servers and Web servers should be in a fixed ratio.
D) JavaScript is written to invoke services defined by a server application.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
61
Mary was using her phone and smart watch at home. She charged her smart watch and drove to the store. The watch and phone lost connection. What is the most likely reason for the lost connection?
A) The devices used Bluetooth and the phone went out of range.
B) The Wi-Fi became congested because of too many users and the connection was lost.
C) She did not have enough data to support the connection.
D) The LAN dropped the connection.
A) The devices used Bluetooth and the phone went out of range.
B) The Wi-Fi became congested because of too many users and the connection was lost.
C) She did not have enough data to support the connection.
D) The LAN dropped the connection.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
62
A protocol is a set of rules that programs on two communicating devices follow.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
63
The File Transfer Protocol (ftp) is generally used for email transmissions.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
64
All of the following are TCP/IP Protocols EXCEPT ________.
A) ftp
B) smtp
C) https
D) xml
A) ftp
B) smtp
C) https
D) xml
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
65
SOAP is a protocol for requesting Web services and for sending responses to Web service requests.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
66
Which protocol standard instructs hardware which wire carries which signal?
A) Bluetooth
B) A switch
C) IEEE 803.3
D) Ethernet
A) Bluetooth
B) A switch
C) IEEE 803.3
D) Ethernet
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
67
There are an infinite number of IPv4 addresses available for everyone on the planet.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
68
What is the first step when sending data through the Internet?
A) Put name on package.
B) Look up address.
C) Put address on package.
D) Assemble the package.
A) Put name on package.
B) Look up address.
C) Put address on package.
D) Assemble the package.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
69
The concept of ________ is the idea that all data is treated equally. Companies do not want carriers deciding which sites load quickly.
A) net neutrality
B) digital switches
C) all data is equal
D) people first
A) net neutrality
B) digital switches
C) all data is equal
D) people first
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
70
Which protocol can have a computer and phone use simultaneously and is always connected?
A) Cable
B) DSL
C) WAN
D) Ethernet
A) Cable
B) DSL
C) WAN
D) Ethernet
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
71
The Hypertext Transport Protocol (http) is a TCP/IP application-layer protocol.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
72
A company has offices in Los Angeles, Dallas, and New York. In order to share resources, what type of network would have to be set up?
A) MAN
B) WAN
C) PAN
D) LAN
A) MAN
B) WAN
C) PAN
D) LAN
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck