Deck 8: Web Server Hardware and Software

Full screen (f)
exit full mode
Question
Platform neutrality was a critical factor in the rapid spread and widespread acceptance of the Web.
Use Space or
up arrow
down arrow
to flip the card.
Question
The rejected e-mails in a white list spam filter are deleted.
Question
Software applications that generate information are located in the first tier of n-tier architectures.
Question
When people use Web browser software to become part of the Web, their computers become Web client computers on a worldwide client/server network.
Question
Very small companies can run Web sites on desktop PCs.
Question
Linux is a closed-source operating system software.
Question
The entity body of a response message returns the HTML page requested by the client machine.
Question
A black list spam filter cannot be implemented at the individual level.
Question
The basic Web client/server model is a three-tier model.
Question
The three main elements of a Web server are the hardware, operating system software, and Web server software.
Question
In dynamic page-generation technologies, server-side scripts and HTML-tagged text are used independently to create the dynamic Web page.
Question
A single client request always results in dozens or even hundreds of separate server responses to locate and deliver information.
Question
The challenge-response content-filtering technique uses a black list as the basis for a confirmation procedure.
Question
Computers that are connected to the Internet and make some of their contents publicly available using the HTTP protocol are called Web servers.
Question
A two-tier client/server architecture is sufficient for delivering dynamic content and processing transactions.
Question
With remote server administration software, a Web site administrator can control a Web site from any Internet-connected computer.
Question
The computers that perform the server function usually have more memory and larger, faster disk drives than the client computers they serve.
Question
The two most commonly used Web server programs are Apache HTTP Server and Microsoft Internet Information Server, IIS.
Question
The Internet connects many different types of computers that are running different types of operating system software.
Question
In client-side scripting, changes are  generated within the browser using software such as JavaScript.
Question
FreeBSD is a(n) _____-based operating system.

A) Apple
B) UNIX
C) Linux
D) Windows 2000 Server
Question
A(n) _____ indicates the HTTP version used by the server, the status of the response, and an explanation of the status information.

A) response header field
B) request header message
C) optional entity body
D) response header line
Question
In a client/server architecture, an optional _____ is sometimes used to pass bulk information to the server.

A) request line
B) request message
C) entity body
D) request header
Question
_____ lets programmers create Web pages that will update asynchronously while the rest of the Web page continues to be displayed in the browser.

A) ASP
B) CGI
C) AJAX
D) C++
Question
Customized pages provided by Web servers in response to specific queries from site visitors are called _____.

A) dynamic content
B) Active Server Pages
C) static pages
D) unchanged content
Question
In _____, software operates on the browser to change what is displayed on the Web page in response to a user's actions.

A) client-side scripting
B) server-side scripting
C) basic content filtering
D) static content generation
Question
In a client/server architecture, the _____ contains a command, the name of the target resource, and the protocol name and version number.

A) request header
B) request line
C) entity body
D) response header
Question
_____ is a standard way of interfacing external applications with Web servers.

A) Common Gateway Interface
B) Graphical User Interface
C) Server-side scripting
D) Client-side scripting
Question
One element that affects overall server performance is the server hardware.
Question
A _____ spam filter examines From addresses and compares them to a list of known good sender addresses.

A) black list
B) full-privilege
C) tracert
D) white list
Question
A drawback of decentralized architecture is that if one of the few servers becomes inoperable, a large portion of the site's capacity is lost.
Question
The smaller servers used in the decentralized architecture are more expensive than the large servers used in the centralized approach.
Question
A centralized architecture spreads failure risk over a large number of servers.
Question
_____ continually conducts surveys to tally the number of Web sites in existence and track which Web server software each uses.

A) BBC
B) Microsoft
C) Netcraft
D) CNN
Question
_____ Server has dominated the Web since 1996 because it is free and performs very efficiently.

A) Apache HTTP
B) Microsoft IIS
C) UNIX
D) Linux
Question
In _____, a program running on a Web server creates a Web page in response to a request for specific information from a Web client.

A) client-side scripting
B) server-level filtering
C) server-side scripting
D) client-level filtering
Question
A _____ is an unsolicited commercial e-mail.

A) spam
B) program
C) virus
D) filter
Question
A _____ page is an unchanging page retrieved from a file on a Web server.

A) static
B) customized
C) personalized
D) dynamic
Question
A(n) _____ is a program that attaches itself to another program and can cause damage when the host program is activated.

A) e-mail filter
B) debugging code
C) computer virus
D) dead link
Question
Few large centralized sites use load-balancing systems, at an additional expense, to assign the workload efficiently.
Question
_____ is the number of HTTP requests that a particular hardware and software combination can process in a unit of time.

A) Protocol
B) Throughput
C) Filter capacity
D) Tracert capacity
Question
In the context of multiple meanings of the term server, the server computer that handles incoming and outgoing e-mail is usually called a(n) _____.
Question
The _____ is the part of the TCP/IP rules that defines the formats used to transfer files between TCP/IP-connected computers.

A) black list spam filter
B) white list spam filter
C) File Transfer Protocol
D) Microsoft Internet Information Server
Question
_____ in the form of programs called Java servlets, is a technology which is used to create dynamic Web pages.
Question
A _____, when clicked, displays an error message rather than a Web page.

A) link checker
B) computer virus
C) filter
D) dead link
Question
A(n) _____ file is a file on a Web server that is not linked to any page.

A) lost
B) index
C) orphan
D) independent
Question
The Web client/server model in which messages are created and read only by the client and the server computers is called a(n) _____.
Question
A(n) _____ is any computer used to provide files or make programs available to other computers connected to it through a network.
Question
In the context of Web server performance evaluation, _____ is testing that is used to compare the performance of hardware and software.

A) response timing
B) monitoring
C) benchmarking
D) filtering
Question
A content-filtering technique where the software that performs the filtering task is placed on individual users' computers is called _____.

A) server-side scripting
B) client-side scripting
C) client-level filtering
D) server-level filtering
Question
_____ is a program that allows a person using one computer to access files and run programs on a second computer that is connected to the Internet.

A) Telnet
B) Ping
C) Finger
D) Tracert
Question
A _____ program sends data packets to every computer on the path between one computer and another and clocks the packets' round-trip times.

A) Telnet
B) Tracert
C) Ping
D) Finger
Question
Efforts to reduce the environmental impact of large computing installations are called _____ computing.

A) efficient
B) green
C) e-conserve
D) e-wise
Question
_____ programs calculate and display the number of hops between computers and the time it takes to traverse the entire one-way path between machines.

A) Route-tracing
B) Indexing
C) Benchmarking
D) Link checker
Question
The computer on which a company runs its accounting and inventory management software is sometimes called a(n) _____.
Question
The server computer on which database management software runs is often called a(n) _____.
Question
The message that a Web client sends to request a file or files from a Web server is called a(n) _____.
Question
_____ architectures are used in LANs, WANs, and the Web.
Question
The practice of launching a return attack by sending e-mail messages back to a computer that originated a suspected spam is referred to as _____.
Question
_____ is a development framework  used to create interactive Web sites that look like applications running in a Web  browser.
Question
Visitor information captured by Web servers are placed into a Web _____ for data analysis.
Question
_____ are messages rejected by a white list spam filter that should not have been rejected.
Question
_____ is a statistical technique in which additional knowledge is used to revise earlier estimates of probabilities.
Question
_____ is the amount of time a server requires to process one HTTP request.
Question
A(n) _____ utility program examines each page on a Web site and reports any URLs that no longer exist.
Question
A large collection of servers is called a(n) _____.
Question
A(n) _____ returns information describing a server's attributes.
Question
In the context of designing a large Website's operations, in a(n) _____ , a few very large and fast computers are used.
Question
A(n) _____ is a piece of network hardware that monitors the workloads of servers attached to it and assigns incoming Web traffic to the server that has the most available capacity at that instant in time.
Question
_____ is the UNIX-based operating system of Oracle.
Question
_____ tasks include running programs and allocating computer resources such as memory and disk space to programs.
Question
Explain the roles of indexing and searching utility programs.
Question
The ability of a network to connect devices that use different operating systems is called _____.
Question
Explain the difference between a dynamic Web page and a static Web page.
Question
Explain the factors required to measure a server's Web page delivery capability.
Question
The various ways that servers can be connected to each other and to related hardware, such as routers and switches, are called _____.
Question
_____ comes bundled with current versions of Microsoft Windows Server operating systems and is used on many corporate intranets because many companies have adopted Microsoft products as their standard products.
Question
A popular server configuration which involves putting small server computers on a single computer board and then installing many of those boards into a rack-mounted frame. These servers-on-a-card are called _____.
Question
Describe the major components of a typical request message from a client to a server.
Question
Describe some of the drawbacks of e-mail.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/80
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Web Server Hardware and Software
1
Platform neutrality was a critical factor in the rapid spread and widespread acceptance of the Web.
True
2
The rejected e-mails in a white list spam filter are deleted.
False
3
Software applications that generate information are located in the first tier of n-tier architectures.
False
4
When people use Web browser software to become part of the Web, their computers become Web client computers on a worldwide client/server network.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
5
Very small companies can run Web sites on desktop PCs.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
6
Linux is a closed-source operating system software.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
7
The entity body of a response message returns the HTML page requested by the client machine.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
8
A black list spam filter cannot be implemented at the individual level.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
9
The basic Web client/server model is a three-tier model.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
10
The three main elements of a Web server are the hardware, operating system software, and Web server software.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
11
In dynamic page-generation technologies, server-side scripts and HTML-tagged text are used independently to create the dynamic Web page.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
12
A single client request always results in dozens or even hundreds of separate server responses to locate and deliver information.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
13
The challenge-response content-filtering technique uses a black list as the basis for a confirmation procedure.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
14
Computers that are connected to the Internet and make some of their contents publicly available using the HTTP protocol are called Web servers.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
15
A two-tier client/server architecture is sufficient for delivering dynamic content and processing transactions.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
16
With remote server administration software, a Web site administrator can control a Web site from any Internet-connected computer.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
17
The computers that perform the server function usually have more memory and larger, faster disk drives than the client computers they serve.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
18
The two most commonly used Web server programs are Apache HTTP Server and Microsoft Internet Information Server, IIS.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
19
The Internet connects many different types of computers that are running different types of operating system software.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
20
In client-side scripting, changes are  generated within the browser using software such as JavaScript.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
21
FreeBSD is a(n) _____-based operating system.

A) Apple
B) UNIX
C) Linux
D) Windows 2000 Server
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
22
A(n) _____ indicates the HTTP version used by the server, the status of the response, and an explanation of the status information.

A) response header field
B) request header message
C) optional entity body
D) response header line
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
23
In a client/server architecture, an optional _____ is sometimes used to pass bulk information to the server.

A) request line
B) request message
C) entity body
D) request header
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
24
_____ lets programmers create Web pages that will update asynchronously while the rest of the Web page continues to be displayed in the browser.

A) ASP
B) CGI
C) AJAX
D) C++
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
25
Customized pages provided by Web servers in response to specific queries from site visitors are called _____.

A) dynamic content
B) Active Server Pages
C) static pages
D) unchanged content
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
26
In _____, software operates on the browser to change what is displayed on the Web page in response to a user's actions.

A) client-side scripting
B) server-side scripting
C) basic content filtering
D) static content generation
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
27
In a client/server architecture, the _____ contains a command, the name of the target resource, and the protocol name and version number.

A) request header
B) request line
C) entity body
D) response header
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
28
_____ is a standard way of interfacing external applications with Web servers.

A) Common Gateway Interface
B) Graphical User Interface
C) Server-side scripting
D) Client-side scripting
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
29
One element that affects overall server performance is the server hardware.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
30
A _____ spam filter examines From addresses and compares them to a list of known good sender addresses.

A) black list
B) full-privilege
C) tracert
D) white list
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
31
A drawback of decentralized architecture is that if one of the few servers becomes inoperable, a large portion of the site's capacity is lost.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
32
The smaller servers used in the decentralized architecture are more expensive than the large servers used in the centralized approach.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
33
A centralized architecture spreads failure risk over a large number of servers.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
34
_____ continually conducts surveys to tally the number of Web sites in existence and track which Web server software each uses.

A) BBC
B) Microsoft
C) Netcraft
D) CNN
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
35
_____ Server has dominated the Web since 1996 because it is free and performs very efficiently.

A) Apache HTTP
B) Microsoft IIS
C) UNIX
D) Linux
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
36
In _____, a program running on a Web server creates a Web page in response to a request for specific information from a Web client.

A) client-side scripting
B) server-level filtering
C) server-side scripting
D) client-level filtering
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
37
A _____ is an unsolicited commercial e-mail.

A) spam
B) program
C) virus
D) filter
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
38
A _____ page is an unchanging page retrieved from a file on a Web server.

A) static
B) customized
C) personalized
D) dynamic
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
39
A(n) _____ is a program that attaches itself to another program and can cause damage when the host program is activated.

A) e-mail filter
B) debugging code
C) computer virus
D) dead link
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
40
Few large centralized sites use load-balancing systems, at an additional expense, to assign the workload efficiently.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
41
_____ is the number of HTTP requests that a particular hardware and software combination can process in a unit of time.

A) Protocol
B) Throughput
C) Filter capacity
D) Tracert capacity
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
42
In the context of multiple meanings of the term server, the server computer that handles incoming and outgoing e-mail is usually called a(n) _____.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
43
The _____ is the part of the TCP/IP rules that defines the formats used to transfer files between TCP/IP-connected computers.

A) black list spam filter
B) white list spam filter
C) File Transfer Protocol
D) Microsoft Internet Information Server
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
44
_____ in the form of programs called Java servlets, is a technology which is used to create dynamic Web pages.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
45
A _____, when clicked, displays an error message rather than a Web page.

A) link checker
B) computer virus
C) filter
D) dead link
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
46
A(n) _____ file is a file on a Web server that is not linked to any page.

A) lost
B) index
C) orphan
D) independent
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
47
The Web client/server model in which messages are created and read only by the client and the server computers is called a(n) _____.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
48
A(n) _____ is any computer used to provide files or make programs available to other computers connected to it through a network.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
49
In the context of Web server performance evaluation, _____ is testing that is used to compare the performance of hardware and software.

A) response timing
B) monitoring
C) benchmarking
D) filtering
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
50
A content-filtering technique where the software that performs the filtering task is placed on individual users' computers is called _____.

A) server-side scripting
B) client-side scripting
C) client-level filtering
D) server-level filtering
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
51
_____ is a program that allows a person using one computer to access files and run programs on a second computer that is connected to the Internet.

A) Telnet
B) Ping
C) Finger
D) Tracert
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
52
A _____ program sends data packets to every computer on the path between one computer and another and clocks the packets' round-trip times.

A) Telnet
B) Tracert
C) Ping
D) Finger
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
53
Efforts to reduce the environmental impact of large computing installations are called _____ computing.

A) efficient
B) green
C) e-conserve
D) e-wise
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
54
_____ programs calculate and display the number of hops between computers and the time it takes to traverse the entire one-way path between machines.

A) Route-tracing
B) Indexing
C) Benchmarking
D) Link checker
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
55
The computer on which a company runs its accounting and inventory management software is sometimes called a(n) _____.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
56
The server computer on which database management software runs is often called a(n) _____.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
57
The message that a Web client sends to request a file or files from a Web server is called a(n) _____.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
58
_____ architectures are used in LANs, WANs, and the Web.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
59
The practice of launching a return attack by sending e-mail messages back to a computer that originated a suspected spam is referred to as _____.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
60
_____ is a development framework  used to create interactive Web sites that look like applications running in a Web  browser.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
61
Visitor information captured by Web servers are placed into a Web _____ for data analysis.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
62
_____ are messages rejected by a white list spam filter that should not have been rejected.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
63
_____ is a statistical technique in which additional knowledge is used to revise earlier estimates of probabilities.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
64
_____ is the amount of time a server requires to process one HTTP request.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
65
A(n) _____ utility program examines each page on a Web site and reports any URLs that no longer exist.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
66
A large collection of servers is called a(n) _____.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
67
A(n) _____ returns information describing a server's attributes.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
68
In the context of designing a large Website's operations, in a(n) _____ , a few very large and fast computers are used.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
69
A(n) _____ is a piece of network hardware that monitors the workloads of servers attached to it and assigns incoming Web traffic to the server that has the most available capacity at that instant in time.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
70
_____ is the UNIX-based operating system of Oracle.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
71
_____ tasks include running programs and allocating computer resources such as memory and disk space to programs.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
72
Explain the roles of indexing and searching utility programs.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
73
The ability of a network to connect devices that use different operating systems is called _____.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
74
Explain the difference between a dynamic Web page and a static Web page.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
75
Explain the factors required to measure a server's Web page delivery capability.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
76
The various ways that servers can be connected to each other and to related hardware, such as routers and switches, are called _____.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
77
_____ comes bundled with current versions of Microsoft Windows Server operating systems and is used on many corporate intranets because many companies have adopted Microsoft products as their standard products.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
78
A popular server configuration which involves putting small server computers on a single computer board and then installing many of those boards into a rack-mounted frame. These servers-on-a-card are called _____.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
79
Describe the major components of a typical request message from a client to a server.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
80
Describe some of the drawbacks of e-mail.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 80 flashcards in this deck.