Deck 8: Web Server Hardware and Software

Full screen (f)
exit full mode
Question
In client-side scripting, changes are generated outside of the browser using software such as JavaScript or Adobe Flash.
Use Space or
up arrow
down arrow
to flip the card.
Question
Sometimes, a single client request results in dozens or even hundreds of separate server responses to locate and deliver information.
Question
The computers that perform the server function usually have more memory and larger, faster disk drives than the client computers they serve.
Question
The three main elements of a Web server are the hardware, operating system software, and client software.
Question
Finger is a program that runs on Windows operating systems.
Question
When people use their Internet connections to become part of the Web, their computers become Web client computers on a worldwide client/server network.
Question
With remote server administration software, a Web site administrator can control a Web site from any Internet-connected computer.
Question
The basic Web client/server model is a three-tier model.
Question
The entity body of a response message returns the HTML page requested by the client machine.
Question
The main job of a Web server computer is to respond to requests from Web client computers.
Question
The two most commonly used Web server programs are Apache HTTP Server and Microsoft Internet Information Server (IIS).
Question
A transaction server is a computer that is connected to the Internet and is used to download Web pages.
Question
Linux is an open-source operating system that is fast, efficient, and easy to install.
Question
A virtual server is a feature that maintains more than one server on one machine.
Question
Ping is an acronym for Packet Internet Grabber.
Question
A black list spam filter can be implemented at the individual level.
Question
On a Web site that is a collection of HTML pages, the content on the site can be changed by running interactive scripts.
Question
The Internet connects many different types of computers running different types of operating system software.
Question
Microsoft server products are more widely used than UNIX-based systems, and many industry experts believe that Windows is a more secure operating system on which to run a Web server.
Question
Some servers are connected through a router to the Internet.
Question
Most large centralized sites use load-balancing systems, at an additional expense, to assign the workload efficiently.
Question
Microsoft developed the first widely used server-side dynamic page-generation technology called ____.

A)ASP
B)SQL
C)JSP
D)PHP
Question
____content is nonstatic information constructed in response to a Web client's request.

A)Dynamic
B)Web
C)Flowing
D)Developed
Question
The ability of a network to connect devices that use different operating systems is called ____.

A)uniform connectivity
B)client/server compatibility
C)device interconnection
D)platform neutrality
Question
____-based machines are more popular, and many believe, more secure than Microsoft Web server products.

A)Apple
B)UNIX
C)Linux
D)Windows 2000 Server
Question
A ____ spam filter examines From addresses and compares them to a list of known good sender addresses.

A)black list
B)full-privilege
C)Tracert
D)white list
Question
In a client/server architecture, a(n)____ contains a command, the name of the target resource, and the protocol name and version number.

A)request header
B)request line
C)entity body
D)request message
Question
One factor that can affect a Web server's performance is the speed of its connection.
Question
A centralized architecture spreads risk over a large number of servers.
Question
A ____ page is an unchanging page retrieved from a file on a Web server.

A)static
B)stable
C)home
D)linked
Question
One drawback of decentralized architecture is that if one of the few servers becomes inoperable, a large portion of the site's capacity is lost.
Question
____ is the dynamic page-generation technology developed by Sun Microsystems.

A)ASP
B)PHP
C)JSP
D)HTTP
Question
In a client/server architecture, an optional ____ is sometimes used to pass bulk information to the server.

A)request line
B)request message
C)entity body
D)request header
Question
____ Server has dominated the Web since 1996 because it is free and performs very efficiently.

A)Apache HTTP
B)Microsoft IIS
C)UNIX
D)Linux
Question
A response ____ indicates the HTTP version used by the server, the status of the response, and an explanation of the status information.

A)header field
B)header message
C)entity body
D)header line
Question
____ is also known as unsolicited commercial e-mail.

A)Spam
B)CGI
C)VPN
D)Java
Question
The smaller servers used in the decentralized architecture are more expensive than the large servers used in the centralized approach.
Question
Which of the following continually conducts surveys to tally the number of Web sites in existence and measure the relative popularity of Internet Web server software?

A)Netscape
B)Microsoft
C)Netcraft
D)CNN
Question
A ____ is a Web page whose content is shaped by a program in response to user requests.

A)static page
B)stable page
C)dynamic page
D)moving file
Question
A(n)____ is a program that attaches itself to another program and can cause damage when the host program is activated.

A)e-mail filter
B)challenge-response
C)computer virus
D)dead link
Question
In ____________________ scripting, a program running on a Web server creates a Web page in response to a request for specific information from a Web client.
Question
A program called ____ tests the connectivity between two computers connected to the Internet.

A)Telnet
B)Tracert
C)Ping
D)Finger
Question
The open-source Apache Software Foundation sponsored a dynamic page-generation technology called ______________________________.
Question
____________________, a programming language produced by Sun, can be used to produce dynamic Web pages.
Question
____ is the number of HTTP requests that a particular hardware and software combination can process in a unit of time.

A)Output
B)Throughput
C)Capability
D)Tracert capacity
Question
A(n)____ file is a file on a Web site that is not linked to any page.

A)lost
B)index
C)orphan
D)independent
Question
A Java ____________________ is an application that runs on a Web server and generates dynamic content pages.
Question
____ sends data packets to every computer on the path between one computer and another and clocks the packet's round-trip times.

A)Telnet
B)Tracert
C)Ping
D)Finger
Question
The server computer on which database management system software runs is often called a(n)____________________ server.
Question
Efforts to reduce the environmental impact of large computing installations are called ____ computing.

A)efficient
B)green
C)e-conserve
D)e-wise
Question
An FTP connection to a computer on which the user has an account is called ____ FTP.

A)anonymous
B)guest
C)dynamic
D)full-privilege
Question
In ____________________ scripting, software operates on the Web client (the browser)to change what is displayed on the Web page in response to a user's actions.
Question
The message that a Web client sends to request a file or files from a Web server is called a(n)____________________.
Question
____ is testing used to compare the performance of hardware and software.

A)Response timing
B)Monitoring
C)Benchmarking
D)Throughputting
Question
All computers that are connected to the Internet and contain documents that their owners have made publicly available through their Internet connections are called ____________________.
Question
The ____ is the part of the TCP/IP rules that defines the formats used to transfer files between TCP/IP-connected computers.

A)URL
B)FPT
C)FTP
D)ASCII
Question
____ programs calculate and display the number of hops between computers and the time it takes to traverse the entire one-way path between machines.

A)Route-tracing
B)Connectivity verification
C)Benchmarking
D)Link checker
Question
____ is a program that allows a person using one computer to access files and run programs on a second computer that is connected to the Internet.

A)Telnet
B)Ping
C)Finger
D)Tracert
Question
A(n)____________________ is any computer used to provide files or make programs available to other computers connected to it through a network.
Question
Client/____________________ architectures are used in LANs, WANs, and the Web.
Question
____________________ servers are made up of small server computers on a single computer board with many of those boards installed into a rack-mounted frame.
Question
Describe some of the drawbacks of e-mail.
Question
____________________ revision is a statistical technique in which additional knowledge is used to revise earlier estimates of probabilities.
Question
Telnet programs use a set of rules called the ____________________.
Question
Explain the difference between a dynamic Web page and a static Web page.
Question
A(n)____________________ link checker checks on sites with which a company has entered a link exchange program and ensures that link exchange partners are fulfilling their obligation to include a link back to the company's Web site.
Question
The job of a Web server is to process and respond to Web ____________________ requests that are sent using HTTP.
Question
What is the purpose of the Ping utility?
Question
A computer must have a(n)____________________ to run programs.
Question
A(n)____________________, when clicked, displays an error message rather than a Web page.
Question
Describe the difference between throughput and response time.
Question
A(n)____________________ utility program examines each page on a Web site and reports on any URLs that are broken, seem broken, or are in some way incorrect.
Question
A(n)_________________________ is a piece of network hardware that monitors the workloads of servers attached to it and assigns incoming traffic to the server that has the most available capacity at that instant in time.
Question
A large collection of servers is called a(n)____________________.
Question
Describe the major components of a typical request message from a client to a server.
Question
_____________________________________________ comes bundled with current versions of Microsoft Windows Server operating systems and is used on many corporate intranets because many companies have adopted Microsoft products as their standard products.
Question
____________________ tasks include running programs and allocating computer resources such as memory and disk space to programs.
Question
A(n)____________________ is a feature that maintains more than one server on one machine.
Question
A(n)____________________ architecture approach requires the use of a few very large and fast computers.
Question
____________________ are messages rejected by a white list spam filter that should not have been.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/80
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Web Server Hardware and Software
1
In client-side scripting, changes are generated outside of the browser using software such as JavaScript or Adobe Flash.
False
2
Sometimes, a single client request results in dozens or even hundreds of separate server responses to locate and deliver information.
True
3
The computers that perform the server function usually have more memory and larger, faster disk drives than the client computers they serve.
True
4
The three main elements of a Web server are the hardware, operating system software, and client software.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
5
Finger is a program that runs on Windows operating systems.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
6
When people use their Internet connections to become part of the Web, their computers become Web client computers on a worldwide client/server network.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
7
With remote server administration software, a Web site administrator can control a Web site from any Internet-connected computer.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
8
The basic Web client/server model is a three-tier model.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
9
The entity body of a response message returns the HTML page requested by the client machine.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
10
The main job of a Web server computer is to respond to requests from Web client computers.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
11
The two most commonly used Web server programs are Apache HTTP Server and Microsoft Internet Information Server (IIS).
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
12
A transaction server is a computer that is connected to the Internet and is used to download Web pages.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
13
Linux is an open-source operating system that is fast, efficient, and easy to install.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
14
A virtual server is a feature that maintains more than one server on one machine.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
15
Ping is an acronym for Packet Internet Grabber.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
16
A black list spam filter can be implemented at the individual level.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
17
On a Web site that is a collection of HTML pages, the content on the site can be changed by running interactive scripts.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
18
The Internet connects many different types of computers running different types of operating system software.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
19
Microsoft server products are more widely used than UNIX-based systems, and many industry experts believe that Windows is a more secure operating system on which to run a Web server.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
20
Some servers are connected through a router to the Internet.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
21
Most large centralized sites use load-balancing systems, at an additional expense, to assign the workload efficiently.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
22
Microsoft developed the first widely used server-side dynamic page-generation technology called ____.

A)ASP
B)SQL
C)JSP
D)PHP
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
23
____content is nonstatic information constructed in response to a Web client's request.

A)Dynamic
B)Web
C)Flowing
D)Developed
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
24
The ability of a network to connect devices that use different operating systems is called ____.

A)uniform connectivity
B)client/server compatibility
C)device interconnection
D)platform neutrality
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
25
____-based machines are more popular, and many believe, more secure than Microsoft Web server products.

A)Apple
B)UNIX
C)Linux
D)Windows 2000 Server
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
26
A ____ spam filter examines From addresses and compares them to a list of known good sender addresses.

A)black list
B)full-privilege
C)Tracert
D)white list
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
27
In a client/server architecture, a(n)____ contains a command, the name of the target resource, and the protocol name and version number.

A)request header
B)request line
C)entity body
D)request message
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
28
One factor that can affect a Web server's performance is the speed of its connection.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
29
A centralized architecture spreads risk over a large number of servers.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
30
A ____ page is an unchanging page retrieved from a file on a Web server.

A)static
B)stable
C)home
D)linked
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
31
One drawback of decentralized architecture is that if one of the few servers becomes inoperable, a large portion of the site's capacity is lost.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
32
____ is the dynamic page-generation technology developed by Sun Microsystems.

A)ASP
B)PHP
C)JSP
D)HTTP
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
33
In a client/server architecture, an optional ____ is sometimes used to pass bulk information to the server.

A)request line
B)request message
C)entity body
D)request header
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
34
____ Server has dominated the Web since 1996 because it is free and performs very efficiently.

A)Apache HTTP
B)Microsoft IIS
C)UNIX
D)Linux
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
35
A response ____ indicates the HTTP version used by the server, the status of the response, and an explanation of the status information.

A)header field
B)header message
C)entity body
D)header line
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
36
____ is also known as unsolicited commercial e-mail.

A)Spam
B)CGI
C)VPN
D)Java
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
37
The smaller servers used in the decentralized architecture are more expensive than the large servers used in the centralized approach.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following continually conducts surveys to tally the number of Web sites in existence and measure the relative popularity of Internet Web server software?

A)Netscape
B)Microsoft
C)Netcraft
D)CNN
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
39
A ____ is a Web page whose content is shaped by a program in response to user requests.

A)static page
B)stable page
C)dynamic page
D)moving file
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
40
A(n)____ is a program that attaches itself to another program and can cause damage when the host program is activated.

A)e-mail filter
B)challenge-response
C)computer virus
D)dead link
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
41
In ____________________ scripting, a program running on a Web server creates a Web page in response to a request for specific information from a Web client.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
42
A program called ____ tests the connectivity between two computers connected to the Internet.

A)Telnet
B)Tracert
C)Ping
D)Finger
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
43
The open-source Apache Software Foundation sponsored a dynamic page-generation technology called ______________________________.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
44
____________________, a programming language produced by Sun, can be used to produce dynamic Web pages.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
45
____ is the number of HTTP requests that a particular hardware and software combination can process in a unit of time.

A)Output
B)Throughput
C)Capability
D)Tracert capacity
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
46
A(n)____ file is a file on a Web site that is not linked to any page.

A)lost
B)index
C)orphan
D)independent
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
47
A Java ____________________ is an application that runs on a Web server and generates dynamic content pages.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
48
____ sends data packets to every computer on the path between one computer and another and clocks the packet's round-trip times.

A)Telnet
B)Tracert
C)Ping
D)Finger
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
49
The server computer on which database management system software runs is often called a(n)____________________ server.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
50
Efforts to reduce the environmental impact of large computing installations are called ____ computing.

A)efficient
B)green
C)e-conserve
D)e-wise
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
51
An FTP connection to a computer on which the user has an account is called ____ FTP.

A)anonymous
B)guest
C)dynamic
D)full-privilege
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
52
In ____________________ scripting, software operates on the Web client (the browser)to change what is displayed on the Web page in response to a user's actions.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
53
The message that a Web client sends to request a file or files from a Web server is called a(n)____________________.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
54
____ is testing used to compare the performance of hardware and software.

A)Response timing
B)Monitoring
C)Benchmarking
D)Throughputting
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
55
All computers that are connected to the Internet and contain documents that their owners have made publicly available through their Internet connections are called ____________________.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
56
The ____ is the part of the TCP/IP rules that defines the formats used to transfer files between TCP/IP-connected computers.

A)URL
B)FPT
C)FTP
D)ASCII
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
57
____ programs calculate and display the number of hops between computers and the time it takes to traverse the entire one-way path between machines.

A)Route-tracing
B)Connectivity verification
C)Benchmarking
D)Link checker
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
58
____ is a program that allows a person using one computer to access files and run programs on a second computer that is connected to the Internet.

A)Telnet
B)Ping
C)Finger
D)Tracert
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
59
A(n)____________________ is any computer used to provide files or make programs available to other computers connected to it through a network.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
60
Client/____________________ architectures are used in LANs, WANs, and the Web.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
61
____________________ servers are made up of small server computers on a single computer board with many of those boards installed into a rack-mounted frame.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
62
Describe some of the drawbacks of e-mail.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
63
____________________ revision is a statistical technique in which additional knowledge is used to revise earlier estimates of probabilities.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
64
Telnet programs use a set of rules called the ____________________.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
65
Explain the difference between a dynamic Web page and a static Web page.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
66
A(n)____________________ link checker checks on sites with which a company has entered a link exchange program and ensures that link exchange partners are fulfilling their obligation to include a link back to the company's Web site.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
67
The job of a Web server is to process and respond to Web ____________________ requests that are sent using HTTP.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
68
What is the purpose of the Ping utility?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
69
A computer must have a(n)____________________ to run programs.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
70
A(n)____________________, when clicked, displays an error message rather than a Web page.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
71
Describe the difference between throughput and response time.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
72
A(n)____________________ utility program examines each page on a Web site and reports on any URLs that are broken, seem broken, or are in some way incorrect.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
73
A(n)_________________________ is a piece of network hardware that monitors the workloads of servers attached to it and assigns incoming traffic to the server that has the most available capacity at that instant in time.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
74
A large collection of servers is called a(n)____________________.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
75
Describe the major components of a typical request message from a client to a server.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
76
_____________________________________________ comes bundled with current versions of Microsoft Windows Server operating systems and is used on many corporate intranets because many companies have adopted Microsoft products as their standard products.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
77
____________________ tasks include running programs and allocating computer resources such as memory and disk space to programs.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
78
A(n)____________________ is a feature that maintains more than one server on one machine.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
79
A(n)____________________ architecture approach requires the use of a few very large and fast computers.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
80
____________________ are messages rejected by a white list spam filter that should not have been.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 80 flashcards in this deck.