Deck 6: The Cloud

Full screen (f)
exit full mode
Question
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.

A)database
B)application
C)network
D)server
Use Space or
up arrow
down arrow
to flip the card.
Question
Identify a characteristic of in-house hosting.

A)speedy development
B)superior adaptability to fluctuating demand
C)control of data location
D)possibly the best disaster preparedness
Question
Cloud-based hosting is the ideal choice for organizations that are required by law to have physical control over their data.
Question
When does it not make sense to use cloud-based hosting infrastructure?
Question
Which of the following is a characteristic of cloud-based hosting?

A)unknown cost structure
B)full control of data location
C)no obsolescence
D)in-depth visibility of security
Question
Which of the following is a benefit of in-house hosting?

A)superior flexibility and adaptability to growing or fluctuating demand
B)lower capital requirements
C)in-depth visibility of security and disaster preparedness
D)fewer training requirements
Question
Compared to in-house hosting, cloud-based hosting ________.

A)provides better visibility of security and disaster preparedness capabilities
B)minimizes the risk of investing in technology that will soon become obsolete
C)provides greater control over the location of data
D)requires a significant amount of capital
Question
In cloud computing, resources are said to be "pooled" because organizations ________.

A)use the public Internet to create the appearance of a private connection
B)use open source standards that enable users to modify a program's source code
C)offer their services to each other free of charge, in a give-and-take arrangement
D)share the same physical hardware through virtualization
Question
Which of the following is defined as the elastic leasing of pooled computer resources over the Internet?

A)broadband
B)wiki
C)the cloud
D)Bluetooth
Question
Define the cloud, and discuss its attributes.
Question
Which of the following features distinguishes a LAN from a WAN?

A)A LAN connects computers in a single location.
B)A WAN has a limit on the number of users.
C)A WAN has low bandwidth.
D)A LAN has stringent hardware requirements.
Question
Which of the following characteristics is a disadvantage of cloud-based hosting?

A)It involves high dependency on vendor.
B)It involves significant requirement of capital.
C)It involves high annual maintenance costs.
D)It involves high ongoing support costs.
Question
Cloud resources are ________ because many different organizations use the same physical hardware.

A)elastic
B)pooled
C)programmatic
D)portable
Question
The cloud is defined as the elastic leasing of pooled computer resources over the Internet.
Question
Which of the following characteristics is a disadvantage of in-house hosting?

A)dependency on vendor
B)loss of control over data location
C)cost uncertainties
D)lack of visibility into security details
Question
Which of the following factors makes cloud-based hosting advantageous today?

A)expensive processors
B)expensive data storage
C)advent of virtualization
D)advent of private IP addressing
Question
Which of the following is a characteristic of in-house hosting?

A)in-depth visibility of disaster preparedness
B)small capital requirements
C)industry-wide economies of scale
D)known cost structure
Question
Identify a characteristic that is a disadvantage of cloud-based hosting.

A)loss of control over data location
B)ongoing support costs
C)increased management requirements
D)significant development effort
Question
Explain the relevance of cloud-based hosting today.
Question
The term ________ means that the computing resources leased can be increased or decreased dynamically in a short span of time and that organizations pay for just the resources that they use.

A)portable
B)pooled
C)programmatic
D)elastic
Question
Which of the following statements is true about cable lines?

A)They provide high-speed data transmission using telephone cables.
B)They offer consistent performance irrespective of the number of users sending and receiving data.
C)They rely on high-capacity optical fiber cables and use their own protocols for data transmission.
D)They provide faster download speeds than DSL modems.
Question
Tristom Technologies, based in New York, opens branches in Chicago and Detroit. Which of the following networks will the company use to connect computers in the three offices?

A)WAN
B)LAN
C)URL
D)XML
Question
A ________ detects the speed that a given device can handle and communicates with it at that speed.

A)codec
B)modem
C)switch
D)port
Question
For communications equipment, k stands for ________.

A)1000
B)1024
C)100
D)1042
Question
Which of the following uses sophisticated protocols that enable several devices to use the same frequency?

A)Wireless WAN
B)DSL modem to ISP
C)Cable modem to ISP
D)Wireless LAN
Question
A ________ is a set of rules that programs on two communicating devices follow.

A)codec
B)cloud
C)packet
D)protocol
Question
Maxwell Insurance recently got its communication network updated to the IEEE 802.11ac protocol. Which of the following is true of this protocol?

A)It is also known as Ethernet.
B)It is used for wired LAN connections.
C)It cannot be processed by access points.
D)It allows speeds of up to 1.3 Gbps.
Question
Which of the following statements is true of digital subscriber line signals?

A)Digital subscriber line signals do not interfere with telephone signals.
B)Digital subscriber line signals use the same protocols as cable modems for data transmission.
C)Digital subscriber line signals replace phone signals and are sent to the ISP.
D)Digital subscriber line signal data transmission and telephone conversations cannot occur simultaneously.
Question
The ________ protocol standard is also known as Ethernet.

A)Bluetooth
B)IEEE 802.11
C)IEEE 802.3
D)DSL
Question
Carol uses a high speed internet connection at home. Her connection is supported by the television line, but it does not interfere with the television signal. Carol uses a(n)________ connection.

A)DSL
B)dial-up
C)cable
D)ADSL
Question
Mary's organization recently switched to a faster internet connection, which has a speed of up to 600 Mbps. Her organization uses a ________.

A)Wireless WAN
B)DSL modem to ISP
C)Cable modem to ISP
D)Wireless LAN
Question
For communications equipment, M stands for ________.

A)1000
B)1024
C)1000000
D)500
Question
With a WAN, an organization is allowed to place communications lines wherever it wants because all lines reside on its premises.
Question
________ is a wireless protocol designed for transmitting data over short distances, replacing cables.

A)IPv6
B)PaaS
C)Bluetooth
D)IPv4
Question
Which of the following is a function of an Internet service provider?

A)It transmits data over short distances, replacing cables.
B)It serves as a user's gateway to the Internet.
C)It describes how messages must be processed for wired transmission.
D)It connects computers within a LAN.
Question
To enable a seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used.

A)layered protocol
B)virtual private network
C)three-tier system
D)remote access system
Question
Zapstreet is a stock broking firm. Its employees use a private network within the organization to communicate with each other regarding stock prices and trading accounts. Zapstreet's network is an example of a(n)________.

A)Ethernet
B)intranet
C)cloud
D)server
Question
Which of the following statements is true about IEEE 802.3?

A)It is the protocol for wireless LAN connections.
B)It is the protocol for Bluetooth.
C)It is the protocol for wired LAN connections.
D)It is the universal standard protocol for all WAN connections.
Question
A computer network is a collection of computers that communicate with one another over transmission lines or wirelessly.
Question
A computer that supports 10/100/1000 Ethernet allows for 10, 100, or 1000 ________ per second.

A)megabytes
B)megabits
C)kilobytes
D)kilobits
Question
Which of the following is the most common format for IP addresses?

A)IPv4
B)TCP
C)IPv6
D)http
Question
When a person connects to the Internet, he or she is actually connecting to an Internet service provider.
Question
A ________ is a worldwide-unique term that is affiliated with a public IP address.

A)URL
B)domain name
C)packet
D)hyperlink
Question
Which of the following TCP/IP application-layer protocols is used to move files over the Internet and maintain Web sites?

A)ftp
B)smtp
C)https
D)http
Question
Which of the following protocols guarantees secure data transmission?

A)http
B)ftp
C)https
D)smtp
Question
The World Wide Web sponsors committees that create and publish protocols and other standards.
Question
An intranet is a private internet that is used exclusively within an organization.
Question
What is a digital subscriber line (DSL)?
Question
The organization responsible for assigning public IP addresses is called ________.

A)CERN
B)IEEE
C)ICANN
D)ISO
Question
Wired LAN connections use a protocol standard called Ethernet to communicate.
Question
Which of the following TCP/IP application-layer protocols is used for email transmissions?

A)ftp
B)https
C)smtp
D)IP
Question
An Internet is a network of networks that connects LANs, WANs, and other internets.
Question
Discuss wireless LAN and PAN connections.
Question
List the functions of an Internet service provider (ISP).
Question
What is a computer network? What are the various types of networks?
Question
The committee that addresses LAN standards is called ICANN.
Question
Bluetooth is a common wired protocol designed to transmit data over long distances.
Question
The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture.

A)ftp
B)smtp
C)http
D)TCP/IP
Question
Because DSL signals interfere with telephone signals, DSL data transmission and telephone conversations cannot occur simultaneously.
Question
A(n)________ is a number that identifies a particular device.

A)domain
B)IP address
C)hyperlink
D)WSDL
Question
Unlike ftp, http does not have a secure version.
Question
smtp is the protocol used between browsers and Web servers.
Question
Assignment of both public and private IP addresses is controlled by ICANN.
Question
Web servers run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients.
Question
ftp is the protocol used mainly for email transmissions.
Question
The ________ tier of the three-tier architecture consists of computers, phones, and other mobile devices that have browsers that request and process Web pages.

A)user
B)server
C)database
D)data link
Question
Which of the following refers to the three tiers in the three-tier architecture?

A)TCP, IP, and http
B)html, XML, and JSON
C)user, server, and database
D)tunnel, switch, and access point
Question
https is the secure version of http.
Question
________ are programs that run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients.

A)Web servers
B)Web browsers
C)Server farms
D)Server racks
Question
Discuss TCP/IP Protocol Architecture, and define Internet protocols.
Question
Describe the three-tier architecture for Web applications such as e-commerce.
Question
The owner of a domain name can change the affiliated IP addresses at its discretion.
Question
TCP/IP protocol architecture is a scheme of protocol types arranged in four layers.
Question
A URL consists of a protocol followed by a domain name or public IP address.
Question
Vivian wants to book a suite at Baron & Olufsen, a luxury hotel chain in Europe, for her brief stay in Austria. When she visits the Web page, the address bar reads http://www.baron-olufsen.com/. This information is the ________ of the Web page.

A)URL
B)IP address
C)protocol
D)email ID
Question
What is an IP address? Describe the advantages of private and public IP addresses.
Question
________ contains much metadata that can be used to validate the format and completeness of the document, but includes considerable overhead.

A)WSDL
B)SOAP
C)JSON
D)XML
Question
Discuss packets, carriers, peering, and net neutrality.
Question
Derek, a Web designer, works for a pharmaceutical company. He uploads information about the company's products on to its official Web site. Which of the following will Derek use to transmit data from the company's server to its Web site?

A)WSDL
B)SOAP
C)JSON
D)XML
Question
________ is a standard for describing the services, inputs and outputs, and other data supported by a Web service.

A)WSDL
B)SOAP
C)JSON
D)XML
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: The Cloud
1
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.

A)database
B)application
C)network
D)server
C
2
Identify a characteristic of in-house hosting.

A)speedy development
B)superior adaptability to fluctuating demand
C)control of data location
D)possibly the best disaster preparedness
C
3
Cloud-based hosting is the ideal choice for organizations that are required by law to have physical control over their data.
False
4
When does it not make sense to use cloud-based hosting infrastructure?
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is a characteristic of cloud-based hosting?

A)unknown cost structure
B)full control of data location
C)no obsolescence
D)in-depth visibility of security
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is a benefit of in-house hosting?

A)superior flexibility and adaptability to growing or fluctuating demand
B)lower capital requirements
C)in-depth visibility of security and disaster preparedness
D)fewer training requirements
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
Compared to in-house hosting, cloud-based hosting ________.

A)provides better visibility of security and disaster preparedness capabilities
B)minimizes the risk of investing in technology that will soon become obsolete
C)provides greater control over the location of data
D)requires a significant amount of capital
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
In cloud computing, resources are said to be "pooled" because organizations ________.

A)use the public Internet to create the appearance of a private connection
B)use open source standards that enable users to modify a program's source code
C)offer their services to each other free of charge, in a give-and-take arrangement
D)share the same physical hardware through virtualization
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is defined as the elastic leasing of pooled computer resources over the Internet?

A)broadband
B)wiki
C)the cloud
D)Bluetooth
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
Define the cloud, and discuss its attributes.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following features distinguishes a LAN from a WAN?

A)A LAN connects computers in a single location.
B)A WAN has a limit on the number of users.
C)A WAN has low bandwidth.
D)A LAN has stringent hardware requirements.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following characteristics is a disadvantage of cloud-based hosting?

A)It involves high dependency on vendor.
B)It involves significant requirement of capital.
C)It involves high annual maintenance costs.
D)It involves high ongoing support costs.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
Cloud resources are ________ because many different organizations use the same physical hardware.

A)elastic
B)pooled
C)programmatic
D)portable
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
The cloud is defined as the elastic leasing of pooled computer resources over the Internet.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following characteristics is a disadvantage of in-house hosting?

A)dependency on vendor
B)loss of control over data location
C)cost uncertainties
D)lack of visibility into security details
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following factors makes cloud-based hosting advantageous today?

A)expensive processors
B)expensive data storage
C)advent of virtualization
D)advent of private IP addressing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is a characteristic of in-house hosting?

A)in-depth visibility of disaster preparedness
B)small capital requirements
C)industry-wide economies of scale
D)known cost structure
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
Identify a characteristic that is a disadvantage of cloud-based hosting.

A)loss of control over data location
B)ongoing support costs
C)increased management requirements
D)significant development effort
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
Explain the relevance of cloud-based hosting today.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
The term ________ means that the computing resources leased can be increased or decreased dynamically in a short span of time and that organizations pay for just the resources that they use.

A)portable
B)pooled
C)programmatic
D)elastic
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following statements is true about cable lines?

A)They provide high-speed data transmission using telephone cables.
B)They offer consistent performance irrespective of the number of users sending and receiving data.
C)They rely on high-capacity optical fiber cables and use their own protocols for data transmission.
D)They provide faster download speeds than DSL modems.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
Tristom Technologies, based in New York, opens branches in Chicago and Detroit. Which of the following networks will the company use to connect computers in the three offices?

A)WAN
B)LAN
C)URL
D)XML
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
A ________ detects the speed that a given device can handle and communicates with it at that speed.

A)codec
B)modem
C)switch
D)port
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
For communications equipment, k stands for ________.

A)1000
B)1024
C)100
D)1042
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following uses sophisticated protocols that enable several devices to use the same frequency?

A)Wireless WAN
B)DSL modem to ISP
C)Cable modem to ISP
D)Wireless LAN
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
A ________ is a set of rules that programs on two communicating devices follow.

A)codec
B)cloud
C)packet
D)protocol
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
Maxwell Insurance recently got its communication network updated to the IEEE 802.11ac protocol. Which of the following is true of this protocol?

A)It is also known as Ethernet.
B)It is used for wired LAN connections.
C)It cannot be processed by access points.
D)It allows speeds of up to 1.3 Gbps.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following statements is true of digital subscriber line signals?

A)Digital subscriber line signals do not interfere with telephone signals.
B)Digital subscriber line signals use the same protocols as cable modems for data transmission.
C)Digital subscriber line signals replace phone signals and are sent to the ISP.
D)Digital subscriber line signal data transmission and telephone conversations cannot occur simultaneously.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
The ________ protocol standard is also known as Ethernet.

A)Bluetooth
B)IEEE 802.11
C)IEEE 802.3
D)DSL
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
Carol uses a high speed internet connection at home. Her connection is supported by the television line, but it does not interfere with the television signal. Carol uses a(n)________ connection.

A)DSL
B)dial-up
C)cable
D)ADSL
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
Mary's organization recently switched to a faster internet connection, which has a speed of up to 600 Mbps. Her organization uses a ________.

A)Wireless WAN
B)DSL modem to ISP
C)Cable modem to ISP
D)Wireless LAN
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
For communications equipment, M stands for ________.

A)1000
B)1024
C)1000000
D)500
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
With a WAN, an organization is allowed to place communications lines wherever it wants because all lines reside on its premises.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
________ is a wireless protocol designed for transmitting data over short distances, replacing cables.

A)IPv6
B)PaaS
C)Bluetooth
D)IPv4
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following is a function of an Internet service provider?

A)It transmits data over short distances, replacing cables.
B)It serves as a user's gateway to the Internet.
C)It describes how messages must be processed for wired transmission.
D)It connects computers within a LAN.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
To enable a seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used.

A)layered protocol
B)virtual private network
C)three-tier system
D)remote access system
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
Zapstreet is a stock broking firm. Its employees use a private network within the organization to communicate with each other regarding stock prices and trading accounts. Zapstreet's network is an example of a(n)________.

A)Ethernet
B)intranet
C)cloud
D)server
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following statements is true about IEEE 802.3?

A)It is the protocol for wireless LAN connections.
B)It is the protocol for Bluetooth.
C)It is the protocol for wired LAN connections.
D)It is the universal standard protocol for all WAN connections.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
A computer network is a collection of computers that communicate with one another over transmission lines or wirelessly.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
A computer that supports 10/100/1000 Ethernet allows for 10, 100, or 1000 ________ per second.

A)megabytes
B)megabits
C)kilobytes
D)kilobits
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following is the most common format for IP addresses?

A)IPv4
B)TCP
C)IPv6
D)http
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
When a person connects to the Internet, he or she is actually connecting to an Internet service provider.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
A ________ is a worldwide-unique term that is affiliated with a public IP address.

A)URL
B)domain name
C)packet
D)hyperlink
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following TCP/IP application-layer protocols is used to move files over the Internet and maintain Web sites?

A)ftp
B)smtp
C)https
D)http
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following protocols guarantees secure data transmission?

A)http
B)ftp
C)https
D)smtp
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
The World Wide Web sponsors committees that create and publish protocols and other standards.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
An intranet is a private internet that is used exclusively within an organization.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
What is a digital subscriber line (DSL)?
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
The organization responsible for assigning public IP addresses is called ________.

A)CERN
B)IEEE
C)ICANN
D)ISO
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
Wired LAN connections use a protocol standard called Ethernet to communicate.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following TCP/IP application-layer protocols is used for email transmissions?

A)ftp
B)https
C)smtp
D)IP
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
An Internet is a network of networks that connects LANs, WANs, and other internets.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
Discuss wireless LAN and PAN connections.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
List the functions of an Internet service provider (ISP).
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
What is a computer network? What are the various types of networks?
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
The committee that addresses LAN standards is called ICANN.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
Bluetooth is a common wired protocol designed to transmit data over long distances.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture.

A)ftp
B)smtp
C)http
D)TCP/IP
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
Because DSL signals interfere with telephone signals, DSL data transmission and telephone conversations cannot occur simultaneously.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
A(n)________ is a number that identifies a particular device.

A)domain
B)IP address
C)hyperlink
D)WSDL
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
Unlike ftp, http does not have a secure version.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
smtp is the protocol used between browsers and Web servers.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
Assignment of both public and private IP addresses is controlled by ICANN.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
Web servers run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
ftp is the protocol used mainly for email transmissions.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
The ________ tier of the three-tier architecture consists of computers, phones, and other mobile devices that have browsers that request and process Web pages.

A)user
B)server
C)database
D)data link
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
Which of the following refers to the three tiers in the three-tier architecture?

A)TCP, IP, and http
B)html, XML, and JSON
C)user, server, and database
D)tunnel, switch, and access point
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
https is the secure version of http.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
________ are programs that run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients.

A)Web servers
B)Web browsers
C)Server farms
D)Server racks
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
Discuss TCP/IP Protocol Architecture, and define Internet protocols.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
Describe the three-tier architecture for Web applications such as e-commerce.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
The owner of a domain name can change the affiliated IP addresses at its discretion.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
TCP/IP protocol architecture is a scheme of protocol types arranged in four layers.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
A URL consists of a protocol followed by a domain name or public IP address.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
Vivian wants to book a suite at Baron & Olufsen, a luxury hotel chain in Europe, for her brief stay in Austria. When she visits the Web page, the address bar reads http://www.baron-olufsen.com/. This information is the ________ of the Web page.

A)URL
B)IP address
C)protocol
D)email ID
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
What is an IP address? Describe the advantages of private and public IP addresses.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
________ contains much metadata that can be used to validate the format and completeness of the document, but includes considerable overhead.

A)WSDL
B)SOAP
C)JSON
D)XML
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
Discuss packets, carriers, peering, and net neutrality.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
Derek, a Web designer, works for a pharmaceutical company. He uploads information about the company's products on to its official Web site. Which of the following will Derek use to transmit data from the company's server to its Web site?

A)WSDL
B)SOAP
C)JSON
D)XML
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
________ is a standard for describing the services, inputs and outputs, and other data supported by a Web service.

A)WSDL
B)SOAP
C)JSON
D)XML
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 100 flashcards in this deck.