Deck 3: Networks and the Cloud

Full screen (f)
exit full mode
Question
A personal area network (PAN)connects devices around a single person.
Use Space or
up arrow
down arrow
to flip the card.
Question
Ethernet or the IEEE 802.3 protocol is used for wired LAN connections.This protocol standard,specifies hardware characteristics,such as which wire carries which signals.
Question
Up to 500 user sites can share a cable line,and performance varies depending on how many
other users are sending and receiving data.
Question
Bluetooth is a technology that allows devices to connect wirelessly to a LAN.
Question
FTP,or File Transfer Protocol,is used for email transmissions.
Question
Internet service providers (ISP)collect money from their customers and pay access fees
and other charges on your behalf.
Question
TCP/IP Protocol architecture is a scheme of protocol types arranged in layers.
Question
Protocols are used to provide seamless flow of data.
Question
The three wireless network options are: Bluetooth,cellular and DSL.
Question
A cellular network,also called a mobile network or wireless WAN (WWAN).
Question
The three common alternatives for connecting to the Internet are WAN,Cable line,and DSL.
Question
The distinguishing characteristic of a LAN is a single location.
Question
Wide area networks (WANs)connect computers at different geographic locations.
Question
Wide area networks are used to connect computers that reside in a single geographic location.
Question
While protocols are rules for devices to follow,they don't specify any particular language.
Question
A digital subscriber line (DSL)operates on the same lines as voice telephones,but it operates so that its signals do not interfere with voice telephone service.
Question
Encapsulation involves breaking up an image,which is too big to travel in one piece,into parts called packets.
Question
Whenever you see http in your browser's address bar,you have a secure transmission and you can safely send sensitive data like credit card numbers.
Question
When you use a browser like Edge,Safari,or Chrome to upload your image to Snapchat,you
are using a program that implements the http protocol.
Question
To connect to the Internet,every device needs an IP address.
Question
Your browser sends requests and receives responses for service encoded in a predefined
http request format.
Question
A web page is a document that is coded in one of the standard page markup languages.
Question
According to economies of scale,the average cost of production decreases as the size of the operation increases.
Question
Simple Mail Transfer Protocol (SMTP)is the transmission protocol used primarily to move files over the Internet.
Question
The user tier consists of computers,smartphones,and other devices that have browsers that request and process.
Question
Cascading Style Sheets (CSS)define the fonts and layout of all elements on web pages and are an example of service-oriented architecture (SOA).
Question
Web servers are software programs that run on a database tier computer.
Question
Cloud resources are pooled,but only one organization can use the physical hardware at a time.
Question
Outsourcing is the process of hiring another organization to perform a service.
Question
Work is distributed among the computers in a web farm to minimize customer delays.
Question
Hypertext Markup Language (html)is the most common language for defining the structure and layout of Web pages.
Question
Almost all social media apps and e-commerce sites use the three-tier architecture.
Question
The cloud is the elastic leasing of pooled computer resources over the Internet.
Question
The commonality of Internet protocols and SOA enables cloud-hosting vendors to provide processing capabilities in flexible yet standardized ways.
Question
In the three-tier architecture,the server tier consists of computers,phones,and other devices that have browsers that request and process web pages.
Question
The term elastic,which was first used this way by Amazon,means that the amount of resources leased can be increased or decreased dynamically and programmatically,in a short span of time.
Question
Three-tier architecture,which is an arrangement of user computers and servers into three categories,or tiers.
Question
AT&T is an example of a Tier 1 network provider.
Question
A login server is an app program that runs on a server-tier computer.
Question
Control of data is the primary advantage of cloud hosting.
Question
___________ is a wireless communication method that is used for transmitting data over short distances,such as in wireless keyboards.

A) Bluetooth
B) WiFi
C) Cellular data
D) WWAN
Question
A/an _____________ operates on the same lines as voice telephones,but it operates so that its signals do not interfere with voice telephone service.

A) cable line
B) cellular data
C) digital subscriber line (DSL)
D) WAN
Question
________________is the protocol used between browsers and Web servers.

A) TCP/IP Protocol architecture
B) Smtp, or Simple Mail Transfer Protocol
C) IP (Internet Protocol
D) Hypertext Transport Protocol (http)
Question
Which of the following is not a protocol type:

A) Hypertext Transport
B) SMTP, or Simple Mail Transfer
C) XML
D) IP
Question
___________ a worldwide-unique name that is affiliated with a particular public IP address.

A) IP address
B) domain name
C) IPv6
D) IPv4
Question
Which of these is not an example of a network:

A) personal area network (PAN)
B) intranet.
C) local area network (LAN)
D) Wide area networks (WANs)
Question
________is the most common language for defining the layout and structure of web pages.

A) xml
B) CSS
C) html
D) SOA
Question
Which of the following is not a function of an ISP (Internet Service Provider)?

A) a legitimate Internet address
B) pay access fees and other charges on your behalf
C) serves as a gate-way to the Internet
D) transmits data over short distances
Question
Which of the following is an application layer protocol?

A) VPN
B) TCP/IP Protocol architecture
C) WNIC
D) IEEE
Question
With a ______,an organization can place communication lines wherever it wants because all lines reside on its premises.

A) WAN
B) PAN
C) network
D) LAN
Question
A private internet used exclusively within an organization is sometimes called a/an _______.

A) internet
B) intranet
C) LAN (local area network)
D) PAN (personal area network)
Question
Computers in a small hospital are most likely connected to each other using ________.

A) WAN
B) VPN
C) LAN
D) Bluetooth
Question
A special-purpose computer that receives and transmits wired traffic on the LAN is a/an:

A) SOHO LAN
B) internet
C) switch
D) cellular network
Question
All of the following are examples of Tier 1 providers except for:

A) Sprint
B) Century
C) Verizon
D) Netflix
Question
Application programs are provided by vendors under platform as a service (PaaS).
Question
If a mobile user moves out of an original cell,the user is automatically switched to an adjoining cell.This is known as a/an:_________.

A) handover
B) switch
C) different frequency
D) mobile network
Question
Platform as a service (PaaS)is where vendors provide hosted computers,an operating system,and possibly a DBMS.
Question
Service-oriented architecture (SOA)provides a way for apps on a network to talk to each other using all these ways,except:

A) standard protocols to publish a menu of services that the application provides
B) the structure of the data that it expects to receive
C) providing metadata about the page
D) the structure of the data that it will produce
Question
An html ________is a notation used to define a data element for display or other purposes.

A) angle bracket
B) tag
C) hyperlink
D) attribute
Question
The ___________protocol is used for wired LAN connections.

A) IEEE 802.3
B) IEEE 802.11
C) IEEE 802.11ac
D) 104.193.184.125
Question
XML is the most common markup language for defining the structure and layout of Web pages.
Question
What are the four basic types of networks? Provide an example of each.
Question
Use the example of Snapchat to describe how protocols work on the Internet.Be sure to include the two techniques that can be used in this process.
Question
An address on the Internet is called a(n)________.

A) VPN
B) TCP
C) IP Address
D) FTP
Question
________agreements that specify how the data will move among providers.

A) Peering
B) Tier 1
C) Internet
D) Carrier
Question
Which of the following is a characteristic of cloud hosting?

A) Even the most reputable organizations do not offer security for cloud hosting.
B) Organizations that hire cloud services run the risk of investing in technology that may become obsolete.
C) Cloud-hosting offers a high degree of transparency on data backup and security.
D) Cloud-hosting offers best-of-breed security and disaster recovery.
Question
Which of the following statements is true about cloud computing?

A) It is yet to be adopted on a large scale as it is expensive.
B) It enables many different organizations to use the same physical hardware
C) It is the leasing out of a fixed amount of server time and resources.
D) It has a negative impact on cloud vendors as they do not benefit from economies of scale.
Question
Explain the services that an ISP provides and list the three common ways to connect to the Internet.
Question
What is Hypertext Markup Language (html)? How are Cascading Style Sheets (CSS used in html?
Question
Why have cellular networks become popular?
Question
Which of the following statements is true about domain names?

A) It is a worldwide-unique name that is associated with a particular Internet address.
B) A nation's government is the only body allowed to register domain names on Internet directories.
C) An Internet address can be associated with only one domain name.
D) It is usually written before a protocol in a URL.
Question
Explain the physical layout of a cellular network and how it sends/receives data to its users.
Question
___________are software programs that run on a server-tier computer and that manage
Http traffic by sending and receiving Web pages to and from clients.

A) DBMS
B) Web farms
C) Web pages
D) Web servers
Question
What are protocols? Provide a few examples of protocols.
Question
Database management system (DBMS)processes requests to:

A) retrieve and store data
B) process application programs
C) request and process Web pages
D) manage http traffic
Question
What is an IP address? Explain the difference between public and private.Describe both IP address formats.
Question
Explain HTTP and HTTPS in general terms.
Question
Which of the following has not contributed to cloud-based hosting being advantageous today.

A) data communication is so cheap
B) SOA and protocol adoption have made the cloud even more economical
C) data storage is nearly free
D) being subject to changes in the vendor's management, policy, and prices
Question
Which of the following statements is true about the cloud?

A) Cloud vendors dynamically allocate physical servers as customer needs vary.
B) The amount of resources that is leased out to organizations is decided by their lease contracts.
C) The amount of resources leased can be increased or decreased dynamically
D) Every organization that uses cloud services is allotted only one virtual machine.
Question
Which of the following is not a tier in three-tier architecture?

A) user
B) server
C) web
D) database
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/92
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Networks and the Cloud
1
A personal area network (PAN)connects devices around a single person.
True
2
Ethernet or the IEEE 802.3 protocol is used for wired LAN connections.This protocol standard,specifies hardware characteristics,such as which wire carries which signals.
True
3
Up to 500 user sites can share a cable line,and performance varies depending on how many
other users are sending and receiving data.
True
4
Bluetooth is a technology that allows devices to connect wirelessly to a LAN.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
5
FTP,or File Transfer Protocol,is used for email transmissions.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
6
Internet service providers (ISP)collect money from their customers and pay access fees
and other charges on your behalf.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
7
TCP/IP Protocol architecture is a scheme of protocol types arranged in layers.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
8
Protocols are used to provide seamless flow of data.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
9
The three wireless network options are: Bluetooth,cellular and DSL.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
10
A cellular network,also called a mobile network or wireless WAN (WWAN).
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
11
The three common alternatives for connecting to the Internet are WAN,Cable line,and DSL.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
12
The distinguishing characteristic of a LAN is a single location.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
13
Wide area networks (WANs)connect computers at different geographic locations.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
14
Wide area networks are used to connect computers that reside in a single geographic location.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
15
While protocols are rules for devices to follow,they don't specify any particular language.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
16
A digital subscriber line (DSL)operates on the same lines as voice telephones,but it operates so that its signals do not interfere with voice telephone service.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
17
Encapsulation involves breaking up an image,which is too big to travel in one piece,into parts called packets.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
18
Whenever you see http in your browser's address bar,you have a secure transmission and you can safely send sensitive data like credit card numbers.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
19
When you use a browser like Edge,Safari,or Chrome to upload your image to Snapchat,you
are using a program that implements the http protocol.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
20
To connect to the Internet,every device needs an IP address.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
21
Your browser sends requests and receives responses for service encoded in a predefined
http request format.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
22
A web page is a document that is coded in one of the standard page markup languages.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
23
According to economies of scale,the average cost of production decreases as the size of the operation increases.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
24
Simple Mail Transfer Protocol (SMTP)is the transmission protocol used primarily to move files over the Internet.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
25
The user tier consists of computers,smartphones,and other devices that have browsers that request and process.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
26
Cascading Style Sheets (CSS)define the fonts and layout of all elements on web pages and are an example of service-oriented architecture (SOA).
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
27
Web servers are software programs that run on a database tier computer.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
28
Cloud resources are pooled,but only one organization can use the physical hardware at a time.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
29
Outsourcing is the process of hiring another organization to perform a service.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
30
Work is distributed among the computers in a web farm to minimize customer delays.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
31
Hypertext Markup Language (html)is the most common language for defining the structure and layout of Web pages.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
32
Almost all social media apps and e-commerce sites use the three-tier architecture.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
33
The cloud is the elastic leasing of pooled computer resources over the Internet.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
34
The commonality of Internet protocols and SOA enables cloud-hosting vendors to provide processing capabilities in flexible yet standardized ways.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
35
In the three-tier architecture,the server tier consists of computers,phones,and other devices that have browsers that request and process web pages.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
36
The term elastic,which was first used this way by Amazon,means that the amount of resources leased can be increased or decreased dynamically and programmatically,in a short span of time.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
37
Three-tier architecture,which is an arrangement of user computers and servers into three categories,or tiers.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
38
AT&T is an example of a Tier 1 network provider.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
39
A login server is an app program that runs on a server-tier computer.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
40
Control of data is the primary advantage of cloud hosting.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
41
___________ is a wireless communication method that is used for transmitting data over short distances,such as in wireless keyboards.

A) Bluetooth
B) WiFi
C) Cellular data
D) WWAN
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
42
A/an _____________ operates on the same lines as voice telephones,but it operates so that its signals do not interfere with voice telephone service.

A) cable line
B) cellular data
C) digital subscriber line (DSL)
D) WAN
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
43
________________is the protocol used between browsers and Web servers.

A) TCP/IP Protocol architecture
B) Smtp, or Simple Mail Transfer Protocol
C) IP (Internet Protocol
D) Hypertext Transport Protocol (http)
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following is not a protocol type:

A) Hypertext Transport
B) SMTP, or Simple Mail Transfer
C) XML
D) IP
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
45
___________ a worldwide-unique name that is affiliated with a particular public IP address.

A) IP address
B) domain name
C) IPv6
D) IPv4
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
46
Which of these is not an example of a network:

A) personal area network (PAN)
B) intranet.
C) local area network (LAN)
D) Wide area networks (WANs)
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
47
________is the most common language for defining the layout and structure of web pages.

A) xml
B) CSS
C) html
D) SOA
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following is not a function of an ISP (Internet Service Provider)?

A) a legitimate Internet address
B) pay access fees and other charges on your behalf
C) serves as a gate-way to the Internet
D) transmits data over short distances
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following is an application layer protocol?

A) VPN
B) TCP/IP Protocol architecture
C) WNIC
D) IEEE
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
50
With a ______,an organization can place communication lines wherever it wants because all lines reside on its premises.

A) WAN
B) PAN
C) network
D) LAN
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
51
A private internet used exclusively within an organization is sometimes called a/an _______.

A) internet
B) intranet
C) LAN (local area network)
D) PAN (personal area network)
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
52
Computers in a small hospital are most likely connected to each other using ________.

A) WAN
B) VPN
C) LAN
D) Bluetooth
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
53
A special-purpose computer that receives and transmits wired traffic on the LAN is a/an:

A) SOHO LAN
B) internet
C) switch
D) cellular network
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
54
All of the following are examples of Tier 1 providers except for:

A) Sprint
B) Century
C) Verizon
D) Netflix
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
55
Application programs are provided by vendors under platform as a service (PaaS).
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
56
If a mobile user moves out of an original cell,the user is automatically switched to an adjoining cell.This is known as a/an:_________.

A) handover
B) switch
C) different frequency
D) mobile network
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
57
Platform as a service (PaaS)is where vendors provide hosted computers,an operating system,and possibly a DBMS.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
58
Service-oriented architecture (SOA)provides a way for apps on a network to talk to each other using all these ways,except:

A) standard protocols to publish a menu of services that the application provides
B) the structure of the data that it expects to receive
C) providing metadata about the page
D) the structure of the data that it will produce
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
59
An html ________is a notation used to define a data element for display or other purposes.

A) angle bracket
B) tag
C) hyperlink
D) attribute
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
60
The ___________protocol is used for wired LAN connections.

A) IEEE 802.3
B) IEEE 802.11
C) IEEE 802.11ac
D) 104.193.184.125
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
61
XML is the most common markup language for defining the structure and layout of Web pages.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
62
What are the four basic types of networks? Provide an example of each.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
63
Use the example of Snapchat to describe how protocols work on the Internet.Be sure to include the two techniques that can be used in this process.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
64
An address on the Internet is called a(n)________.

A) VPN
B) TCP
C) IP Address
D) FTP
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
65
________agreements that specify how the data will move among providers.

A) Peering
B) Tier 1
C) Internet
D) Carrier
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following is a characteristic of cloud hosting?

A) Even the most reputable organizations do not offer security for cloud hosting.
B) Organizations that hire cloud services run the risk of investing in technology that may become obsolete.
C) Cloud-hosting offers a high degree of transparency on data backup and security.
D) Cloud-hosting offers best-of-breed security and disaster recovery.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
67
Which of the following statements is true about cloud computing?

A) It is yet to be adopted on a large scale as it is expensive.
B) It enables many different organizations to use the same physical hardware
C) It is the leasing out of a fixed amount of server time and resources.
D) It has a negative impact on cloud vendors as they do not benefit from economies of scale.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
68
Explain the services that an ISP provides and list the three common ways to connect to the Internet.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
69
What is Hypertext Markup Language (html)? How are Cascading Style Sheets (CSS used in html?
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
70
Why have cellular networks become popular?
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
71
Which of the following statements is true about domain names?

A) It is a worldwide-unique name that is associated with a particular Internet address.
B) A nation's government is the only body allowed to register domain names on Internet directories.
C) An Internet address can be associated with only one domain name.
D) It is usually written before a protocol in a URL.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
72
Explain the physical layout of a cellular network and how it sends/receives data to its users.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
73
___________are software programs that run on a server-tier computer and that manage
Http traffic by sending and receiving Web pages to and from clients.

A) DBMS
B) Web farms
C) Web pages
D) Web servers
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
74
What are protocols? Provide a few examples of protocols.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
75
Database management system (DBMS)processes requests to:

A) retrieve and store data
B) process application programs
C) request and process Web pages
D) manage http traffic
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
76
What is an IP address? Explain the difference between public and private.Describe both IP address formats.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
77
Explain HTTP and HTTPS in general terms.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
78
Which of the following has not contributed to cloud-based hosting being advantageous today.

A) data communication is so cheap
B) SOA and protocol adoption have made the cloud even more economical
C) data storage is nearly free
D) being subject to changes in the vendor's management, policy, and prices
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
79
Which of the following statements is true about the cloud?

A) Cloud vendors dynamically allocate physical servers as customer needs vary.
B) The amount of resources that is leased out to organizations is decided by their lease contracts.
C) The amount of resources leased can be increased or decreased dynamically
D) Every organization that uses cloud services is allotted only one virtual machine.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
80
Which of the following is not a tier in three-tier architecture?

A) user
B) server
C) web
D) database
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 92 flashcards in this deck.