Deck 6: The Cloud

Full screen (f)
exit full mode
Question
A computer network between Seattle and Philadelphia is made possible through a LAN.
Use Space or
up arrow
down arrow
to flip the card.
Question
Communication speeds are expressed in bytes, whereas memory sizes are expressed in bits.
Question
Wired LAN connections use the IEEE 802.3 protocol, whereas wireless LAN connections use the IEEE 802.11 protocol.
Question
An intranet is a private internet that is used exclusively within an organization.
Question
Bluetooth is a common wired protocol designed to transmit data over long distances.
Question
Cloud resources are pooled because many different organizations use the cloud to share hardware through virtualization.
Question
Wired LAN connections use a protocol standard called Ethernet to communicate.
Question
A computer network is a collection of computers that communicate with one another over transmission lines or wirelessly.
Question
IEEE LAN protocols always start with the numbers 802.
Question
One of the advantages of cloud-based hosting, as long as it is with reputable organizations, is receiving the best-of-breed security.
Question
When a person connects to the Internet, he or she is actually connecting to an Internet Service Provider.
Question
The World Wide Web sponsors committees that create and publish protocols and other standards.
Question
The abbreviations k, M, and G have the same meaning for computer memory as they have for communication speeds.
Question
With a WAN, an organization is allowed to place communications lines wherever it wants because all lines reside on its premises.
Question
A switch detects the speed that a given device can handle and communicates with it at that speed.
Question
The committee that addresses LAN standards is called ICANN.
Question
Cloud-based hosting is the ideal choice for organizations that are required by law to have physical control over their data.
Question
An Internet is a network of networks that connects LANs, WANs, and other internets.
Question
A university would use a WAN to connect its campuses in two cities.
Question
The cloud is defined as the elastic leasing of pooled computer resources over the Internet.
Question
TCP/IP protocol architecture is a scheme of protocol types arranged in four layers.
Question
In three-tier architecture, the server tier consists of computers, phones, and other mobile devices that have browsers that request and process Web pages.
Question
A domain name is a worldwide-unique name that is affiliated with a public IP address.
Question
https is the secure version of http.
Question
Cable modems undergo modulation in such a way that their signals interfere with TV signals.
Question
An ISP serves as a user's gateway to the Internet.
Question
Both WSDLs and SOAP messages are coded in XML.
Question
Digital subscriber lines use their own protocols for data transmission.
Question
All the computers on a LAN use many public IP addresses.
Question
A URL consists of a protocol followed by a domain name or public IP address.
Question
SOAP is a protocol for requesting Web services and for sending responses to Web service requests.
Question
The owner of a domain name can change the affiliated IP addresses at its discretion.
Question
Because DSL signals interfere with telephone signals, DSL data transmission and telephone conversations cannot occur simultaneously.
Question
smtp is the protocol used between browsers and Web servers.
Question
Unlike ftp, http does not have a secure version.
Question
ftp is the protocol used mainly for email transmissions.
Question
A cable line is the second type of LAN connection.
Question
A content delivery network (CDN) is a system of both hardware and software that stores user data in many different geographical locations and makes that data available on demand.
Question
Web servers run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients.
Question
Assignment of both public and private IP addresses is controlled by ICANN.
Question
The most basic cloud offering is platform as a service (PaaS) that is the cloud hosting of a bare server computer or data storage.
Question
Which of the following characteristics is a disadvantage of cloud-based hosting?

A) It involves high dependency on vendor.
B) It involves significant requirement of capital.
C) It involves high annual maintenance costs.
D) It involves high ongoing support costs.
Question
Remote action systems save time and travel expense and make the skills and abilities of an expert available in places where he or she is not physically located.
Question
Which of the following is defined as the elastic leasing of pooled computer resources over the Internet?

A) broadband
B) wiki
C) the cloud
D) Bluetooth
Question
Cloud resources are ________ because many different organizations use the same physical hardware.

A) elastic
B) pooled
C) programmatic
D) portable
Question
Salesforce.com provides hardware and programs for customer and sales tracking. This is an example of a cloud vendor who provides software as a service.
Question
Oracle On demand is an example of infrastructure as a service.
Question
Teleaction increases the value of local mediocrity.
Question
Identify a characteristic that is a disadvantage of cloud-based hosting?

A) loss of control over data location
B) ongoing support costs
C) increased management requirements
D) significant development effort
Question
The term ________ means that the computing resources leased can be increased or decreased dynamically in a short span of time and that organizations pay for just the resources that they use.

A) portable
B) pooled
C) programmatic
D) elastic
Question
Telesurgery uses telecommunications to link surgeons to robotic equipment at distant locations.
Question
To ensure security, the VPN client software decrypts the original message so that its contents are protected from snooping.
Question
Microsoft CRM OnLine can be classified as a PaaS.
Question
Which of the following factors makes cloud-based hosting advantageous today?

A) expensive processors
B) expensive data storage
C) advent of virtualization
D) advent of private IP addressing
Question
Which of the following is a characteristic of cloud-based hosting?

A) unknown cost structure
B) full control of data location
C) no obsolescence
D) in-depth visibility of security
Question
An organization that provides software as a service provides only operating systems and application programs.
Question
Which of the following is a characteristic of in-house hosting?

A) in-depth visibility of disaster preparedness
B) small capital requirements
C) industry-wide economies of scale
D) known cost structure
Question
Small companies usually lack the technical expertise and management to load operating systems onto servers acquired via the cloud.
Question
Identify a characteristic of in-house hosting.

A) speedy development
B) superior adaptability to fluctuating demand
C) control of data location
D) possibly the best disaster preparedness
Question
Which of the following characteristics is a disadvantage of in-house hosting?

A) dependency on vendor
B) loss of control over data location
C) cost uncertainties
D) lack of visibility into security details
Question
Which of the following features distinguishes a LAN from a WAN?

A) A LAN connects computers in a single location.
B) A WAN has a limit on the number of users.
C) A WAN has low bandwidth.
D) A LAN has stringent hardware requirements.
Question
Which of the following statements is True about the IEEE 802.11ac protocol?

A) It is also known as Ethernet.
B) It is used for wired LAN connections.
C) It cannot be processed by access points.
D) It allows speeds of up to 1.3 Gbps.
Question
Computers that reside in different geographic locations are connected using a(n) ________.

A) WAN
B) LAN
C) URL
D) XML
Question
A ________ is a set of rules that programs on two communicating devices follow.

A) codec
B) cloud
C) packet
D) protocol
Question
To enable a seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used.

A) layered protocol
B) virtual private network
C) three-tier system
D) remote access system
Question
Compared to in-house hosting, cloud-based hosting ________.

A) provides better visibility of security and disaster preparedness capabilities
B) minimizes the risk of investing in technology that will soon become obsolete
C) provides greater control over the location of data
D) requires a significant amount of capital
Question
Which of the following statements is True about cable lines?

A) They provide high-speed data transmission using telephone cables.
B) They offer consistent performance irrespective of the number of users sending and receiving data.
C) They rely on high-capacity optical fiber cables and use their own protocols for data transmission.
D) They provide faster download speeds than DSL modems.
Question
A computer that supports 10/100/1000 Ethernet allows for 10, 100, or 1000 ________ per second.

A) megabytes
B) megabits
C) kilobytes
D) kilobits
Question
The ________ protocol standard is also known as Ethernet.

A) Bluetooth
B) IEEE 802.11
C) IEEE 802.3
D) IEEE 802.11ac
Question
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.

A) database
B) application
C) network
D) server
Question
________ is a wireless protocol designed for transmitting data over short distances, replacing cables.

A) IPv6
B) PaaS
C) Bluetooth
D) IPv4
Question
________ signals do not interfere with TV signals even though they use the same lines.

A) DSL
B) Dial-up
C) Cable
D) ADSL
Question
A ________ detects the speed that a given device can handle and communicates with it at that speed.

A) codec
B) modem
C) switch
D) port
Question
Which of the following statements is True about IEEE 802.3?

A) It is the protocol for wireless LAN connections.
B) It is the protocol for Bluetooth.
C) It is the protocol for wired LAN connections.
D) It is the universal standard protocol for all WAN connections.
Question
For communications equipment, k stands for ________.

A) 1000
B) 1024
C) 100
D) 1042
Question
Which of the following statements is True of digital subscriber line signals?

A) Digital subscriber line signals do not interfere with telephone signals.
B) Digital subscriber line signals use the same protocols as cable modems for data transmission.
C) Digital subscriber line signals replace phone signals and are sent to the ISP.
D) Digital subscriber line signal data transmission and telephone conversations cannot occur simultaneously.
Question
Which of the following is a benefit of in-house hosting?

A) superior flexibility and adaptability to growing or fluctuating demand
B) lower capital requirements
C) in-depth visibility of security and disaster preparedness
D) fewer training requirements
Question
A private internet that is used exclusively within an organization is called a(n) ________.

A) Ethernet
B) intranet
C) cloud
D) server
Question
Which of the following is a function of an ISP?

A) It transmits data over short distances, replacing cables.
B) It serves as a user's gateway to the Internet.
C) It describes how messages must be processed for wired transmission.
D) It connects computers within a LAN.
Question
In cloud computing, resources are said to be "pooled" because organizations ________.

A) use the public Internet to create the appearance of a private connection
B) use open source standards that enable users to modify a program's source code
C) offer their services to each other free of charge, in a give-and-take arrangement
D) share the same physical hardware through virtualization
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/120
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: The Cloud
1
A computer network between Seattle and Philadelphia is made possible through a LAN.
False
2
Communication speeds are expressed in bytes, whereas memory sizes are expressed in bits.
False
3
Wired LAN connections use the IEEE 802.3 protocol, whereas wireless LAN connections use the IEEE 802.11 protocol.
True
4
An intranet is a private internet that is used exclusively within an organization.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
5
Bluetooth is a common wired protocol designed to transmit data over long distances.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
6
Cloud resources are pooled because many different organizations use the cloud to share hardware through virtualization.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
7
Wired LAN connections use a protocol standard called Ethernet to communicate.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
8
A computer network is a collection of computers that communicate with one another over transmission lines or wirelessly.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
9
IEEE LAN protocols always start with the numbers 802.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
10
One of the advantages of cloud-based hosting, as long as it is with reputable organizations, is receiving the best-of-breed security.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
11
When a person connects to the Internet, he or she is actually connecting to an Internet Service Provider.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
12
The World Wide Web sponsors committees that create and publish protocols and other standards.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
13
The abbreviations k, M, and G have the same meaning for computer memory as they have for communication speeds.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
14
With a WAN, an organization is allowed to place communications lines wherever it wants because all lines reside on its premises.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
15
A switch detects the speed that a given device can handle and communicates with it at that speed.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
16
The committee that addresses LAN standards is called ICANN.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
17
Cloud-based hosting is the ideal choice for organizations that are required by law to have physical control over their data.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
18
An Internet is a network of networks that connects LANs, WANs, and other internets.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
19
A university would use a WAN to connect its campuses in two cities.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
20
The cloud is defined as the elastic leasing of pooled computer resources over the Internet.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
21
TCP/IP protocol architecture is a scheme of protocol types arranged in four layers.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
22
In three-tier architecture, the server tier consists of computers, phones, and other mobile devices that have browsers that request and process Web pages.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
23
A domain name is a worldwide-unique name that is affiliated with a public IP address.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
24
https is the secure version of http.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
25
Cable modems undergo modulation in such a way that their signals interfere with TV signals.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
26
An ISP serves as a user's gateway to the Internet.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
27
Both WSDLs and SOAP messages are coded in XML.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
28
Digital subscriber lines use their own protocols for data transmission.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
29
All the computers on a LAN use many public IP addresses.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
30
A URL consists of a protocol followed by a domain name or public IP address.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
31
SOAP is a protocol for requesting Web services and for sending responses to Web service requests.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
32
The owner of a domain name can change the affiliated IP addresses at its discretion.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
33
Because DSL signals interfere with telephone signals, DSL data transmission and telephone conversations cannot occur simultaneously.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
34
smtp is the protocol used between browsers and Web servers.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
35
Unlike ftp, http does not have a secure version.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
36
ftp is the protocol used mainly for email transmissions.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
37
A cable line is the second type of LAN connection.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
38
A content delivery network (CDN) is a system of both hardware and software that stores user data in many different geographical locations and makes that data available on demand.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
39
Web servers run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
40
Assignment of both public and private IP addresses is controlled by ICANN.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
41
The most basic cloud offering is platform as a service (PaaS) that is the cloud hosting of a bare server computer or data storage.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following characteristics is a disadvantage of cloud-based hosting?

A) It involves high dependency on vendor.
B) It involves significant requirement of capital.
C) It involves high annual maintenance costs.
D) It involves high ongoing support costs.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
43
Remote action systems save time and travel expense and make the skills and abilities of an expert available in places where he or she is not physically located.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following is defined as the elastic leasing of pooled computer resources over the Internet?

A) broadband
B) wiki
C) the cloud
D) Bluetooth
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
45
Cloud resources are ________ because many different organizations use the same physical hardware.

A) elastic
B) pooled
C) programmatic
D) portable
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
46
Salesforce.com provides hardware and programs for customer and sales tracking. This is an example of a cloud vendor who provides software as a service.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
47
Oracle On demand is an example of infrastructure as a service.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
48
Teleaction increases the value of local mediocrity.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
49
Identify a characteristic that is a disadvantage of cloud-based hosting?

A) loss of control over data location
B) ongoing support costs
C) increased management requirements
D) significant development effort
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
50
The term ________ means that the computing resources leased can be increased or decreased dynamically in a short span of time and that organizations pay for just the resources that they use.

A) portable
B) pooled
C) programmatic
D) elastic
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
51
Telesurgery uses telecommunications to link surgeons to robotic equipment at distant locations.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
52
To ensure security, the VPN client software decrypts the original message so that its contents are protected from snooping.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
53
Microsoft CRM OnLine can be classified as a PaaS.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following factors makes cloud-based hosting advantageous today?

A) expensive processors
B) expensive data storage
C) advent of virtualization
D) advent of private IP addressing
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following is a characteristic of cloud-based hosting?

A) unknown cost structure
B) full control of data location
C) no obsolescence
D) in-depth visibility of security
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
56
An organization that provides software as a service provides only operating systems and application programs.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following is a characteristic of in-house hosting?

A) in-depth visibility of disaster preparedness
B) small capital requirements
C) industry-wide economies of scale
D) known cost structure
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
58
Small companies usually lack the technical expertise and management to load operating systems onto servers acquired via the cloud.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
59
Identify a characteristic of in-house hosting.

A) speedy development
B) superior adaptability to fluctuating demand
C) control of data location
D) possibly the best disaster preparedness
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following characteristics is a disadvantage of in-house hosting?

A) dependency on vendor
B) loss of control over data location
C) cost uncertainties
D) lack of visibility into security details
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
61
Which of the following features distinguishes a LAN from a WAN?

A) A LAN connects computers in a single location.
B) A WAN has a limit on the number of users.
C) A WAN has low bandwidth.
D) A LAN has stringent hardware requirements.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following statements is True about the IEEE 802.11ac protocol?

A) It is also known as Ethernet.
B) It is used for wired LAN connections.
C) It cannot be processed by access points.
D) It allows speeds of up to 1.3 Gbps.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
63
Computers that reside in different geographic locations are connected using a(n) ________.

A) WAN
B) LAN
C) URL
D) XML
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
64
A ________ is a set of rules that programs on two communicating devices follow.

A) codec
B) cloud
C) packet
D) protocol
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
65
To enable a seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used.

A) layered protocol
B) virtual private network
C) three-tier system
D) remote access system
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
66
Compared to in-house hosting, cloud-based hosting ________.

A) provides better visibility of security and disaster preparedness capabilities
B) minimizes the risk of investing in technology that will soon become obsolete
C) provides greater control over the location of data
D) requires a significant amount of capital
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
67
Which of the following statements is True about cable lines?

A) They provide high-speed data transmission using telephone cables.
B) They offer consistent performance irrespective of the number of users sending and receiving data.
C) They rely on high-capacity optical fiber cables and use their own protocols for data transmission.
D) They provide faster download speeds than DSL modems.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
68
A computer that supports 10/100/1000 Ethernet allows for 10, 100, or 1000 ________ per second.

A) megabytes
B) megabits
C) kilobytes
D) kilobits
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
69
The ________ protocol standard is also known as Ethernet.

A) Bluetooth
B) IEEE 802.11
C) IEEE 802.3
D) IEEE 802.11ac
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
70
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.

A) database
B) application
C) network
D) server
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
71
________ is a wireless protocol designed for transmitting data over short distances, replacing cables.

A) IPv6
B) PaaS
C) Bluetooth
D) IPv4
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
72
________ signals do not interfere with TV signals even though they use the same lines.

A) DSL
B) Dial-up
C) Cable
D) ADSL
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
73
A ________ detects the speed that a given device can handle and communicates with it at that speed.

A) codec
B) modem
C) switch
D) port
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
74
Which of the following statements is True about IEEE 802.3?

A) It is the protocol for wireless LAN connections.
B) It is the protocol for Bluetooth.
C) It is the protocol for wired LAN connections.
D) It is the universal standard protocol for all WAN connections.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
75
For communications equipment, k stands for ________.

A) 1000
B) 1024
C) 100
D) 1042
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
76
Which of the following statements is True of digital subscriber line signals?

A) Digital subscriber line signals do not interfere with telephone signals.
B) Digital subscriber line signals use the same protocols as cable modems for data transmission.
C) Digital subscriber line signals replace phone signals and are sent to the ISP.
D) Digital subscriber line signal data transmission and telephone conversations cannot occur simultaneously.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
77
Which of the following is a benefit of in-house hosting?

A) superior flexibility and adaptability to growing or fluctuating demand
B) lower capital requirements
C) in-depth visibility of security and disaster preparedness
D) fewer training requirements
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
78
A private internet that is used exclusively within an organization is called a(n) ________.

A) Ethernet
B) intranet
C) cloud
D) server
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
79
Which of the following is a function of an ISP?

A) It transmits data over short distances, replacing cables.
B) It serves as a user's gateway to the Internet.
C) It describes how messages must be processed for wired transmission.
D) It connects computers within a LAN.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
80
In cloud computing, resources are said to be "pooled" because organizations ________.

A) use the public Internet to create the appearance of a private connection
B) use open source standards that enable users to modify a program's source code
C) offer their services to each other free of charge, in a give-and-take arrangement
D) share the same physical hardware through virtualization
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 120 flashcards in this deck.