Deck 10: Internet-Based Applications

Full screen (f)
exit full mode
Question
SMTP returns an end-to-end acknowledgement to the originator to indicate that the message was successfully delivered to the recipient.
Use Space or
up arrow
down arrow
to flip the card.
Question
HTTP uses a request / response style of communication.
Question
Image-based applications include facsimile,computer-aided design (CAD),publishing,and medical imaging.
Question
A widely used extension to the RFC 822 framework that expands what can be sent via email is called _________.

A)MIME
B)ASCII
C)VoIP
D)SMTP
Question
A number of protocols are instrumental in supporting multimedia traffic.
Question
SMTP can be used to send executable files and other binary file types.
Question
Which of the following is NOT a standard MIME content type?

A)audio
B)binary
C)messages
D)image
Question
Upon receipt,the SMTP receiver must decide whether to place the message in the appropriate user mailbox or local outgoing mail queue.
Question
In order to be compliant,a mail system must include all five of the additional MIME headers.
Question
A security policy should be established and careful consideration given to the personnel allowed external access to internal systems.
Question
SMTP does not place any requirements on the contents or message bodies of mail it processes.
Question
Email functions visible to a user,such as facilities for preparing and submitting messages,filing,replying,and forwarding,are considered:

A)message transfer agent functions
B)client functions
C)email client functions
D)user agent functions
Question
Email functions concerned with the protocol operations needed to transmit and deliver messages are considered:

A)message transfer agent functions
B)client functions
C)email client functions
D)user agent functions
Question
The simplest form of electronic mail is a single-system facility where all users of the facility exchange messages.
Question
End users should not run virus protection software that examines incoming mail because the administrators of the email servers have already checked for viruses.
Question
The rapid growth in the use of the Web is due to the standardization of all the elements that support Web applications.
Question
SMTP is the standard protocol in the TCP / IP protocol suite for transferring email between hosts.
Question
Which of the following is a true statement regarding SMTP processing of messages?

A)messages typically are sent through multiple SMTP systems while going from the sender to the recipient
B)the SMTP sender remains responsible for a message until it has been delivered to the recipient
C)SMTP does not guarantee that all messages are delivered
D)SMTP attempts to send messages until the recipients become available
Question
In general,public and Internet mail systems offer access to a wider range of services and more robust applications.
Question
MIME subtypes of the multi-part type are used to describe how the different parts of a message go together.
Question
When HTTPS is used,which element of the communication is encrypted?

A)URL of the requested document
B)contents of the document
C)cookies sent from browser to server
D)all of the above
Question
The ________ works on behalf of user actors and user applications and is their representative within the e-mail service.

A)MUA
B)MHS
C)MSA
D)MTA
Question
A(n)_________ is an Internet e-mail provider.

A)POP
B)ADMD
C)DNS
D)IEP
Question
________ defines a format for text messages that are sent using e-mail.

A)RFC 208
B)RFC 1939
C)RFC 137
D)RFC 822
Question
When using HTTP,a network data object or service that can be identified by a URL is called a ____________.

A)client
B)server
C)host
D)resource
Question
Which of the following types of intermediate devices can be used in an HTTP network?

A)proxies
B)gateways
C)tunnels
D)all of the above
Question
The term "multimedia" refers to four distinct types of media: text,graphics,video,and ________.
Question
VoIP,streaming audio,and streaming video are considered _________ applications even though each involves a single media type.
Question
The _________ is fundamentally a client / server application running over the Internet and TCP / IP intranets.

A)World Wide Web
B)ADMD
C)MDA
D)Hypertext Transfer Protocol
Question
The ________ service supports the communication of individual pictures,charts,or drawings.
Question
The ________ relays mail for one application-level hop.

A)MSA
B)MS
C)MTA
D)MDA
Question
The ________ is a directory lookup service that provides a mapping between the name of a host on the Internet and its numerical address.
Question
When using HTTP,an application program that accepts connections in order to service requests by sending back responses is called a ___________.

A)client
B)server
C)host
D)resource
Question
When using HTTP,an application program that establishes connections for the purpose of sending requests to a server is called a __________.

A)client
B)server
C)host
D)resource
Question
The ________ service carries sequences of pictures in time,in essence,making use of a sequence of raster-scan images.
Question
________ refers to the combination of HTTP and SSL to implement secure communication between a Web browser and a Web server.
Question
The _________ accepts the message submitted by an MUA and enforces the policies of the hosting domain and the requirements of Internet standards.
Question
________ is the protocol used for transfer of mail from a user agent to an MTA and from one MTA to another.
Question
________ media refers to multimedia files that begin playing immediately or within seconds after it is received by a computer from the Internet or Web,thus the media content is consumed as it is delivered from the server rather than waiting until an entire file is downloaded.
Question
SSL provides three categories of security: confidentiality,message integrity,and ___________.
Question
HTTP is a ________ protocol; each transaction is treated independently.
Question
The ________ and the Internet Message Access Protocol support retrieval of mail between a client system and a server that holds the mail for the client.
Question
The five header fields defined in MIME are: MIME version,content-type,content-transfer-encoding,content-ID,and ___________.
Question
A ________ is an intermediary program that acts as both a server and a client for the purpose of making requests on behalf of other clients.
Question
A _______ is a network data object or service that can be identified by a URL.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Internet-Based Applications
1
SMTP returns an end-to-end acknowledgement to the originator to indicate that the message was successfully delivered to the recipient.
False
2
HTTP uses a request / response style of communication.
True
3
Image-based applications include facsimile,computer-aided design (CAD),publishing,and medical imaging.
True
4
A widely used extension to the RFC 822 framework that expands what can be sent via email is called _________.

A)MIME
B)ASCII
C)VoIP
D)SMTP
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
A number of protocols are instrumental in supporting multimedia traffic.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
SMTP can be used to send executable files and other binary file types.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is NOT a standard MIME content type?

A)audio
B)binary
C)messages
D)image
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
Upon receipt,the SMTP receiver must decide whether to place the message in the appropriate user mailbox or local outgoing mail queue.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
In order to be compliant,a mail system must include all five of the additional MIME headers.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
A security policy should be established and careful consideration given to the personnel allowed external access to internal systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
SMTP does not place any requirements on the contents or message bodies of mail it processes.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
Email functions visible to a user,such as facilities for preparing and submitting messages,filing,replying,and forwarding,are considered:

A)message transfer agent functions
B)client functions
C)email client functions
D)user agent functions
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
Email functions concerned with the protocol operations needed to transmit and deliver messages are considered:

A)message transfer agent functions
B)client functions
C)email client functions
D)user agent functions
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
The simplest form of electronic mail is a single-system facility where all users of the facility exchange messages.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
End users should not run virus protection software that examines incoming mail because the administrators of the email servers have already checked for viruses.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
The rapid growth in the use of the Web is due to the standardization of all the elements that support Web applications.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
SMTP is the standard protocol in the TCP / IP protocol suite for transferring email between hosts.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is a true statement regarding SMTP processing of messages?

A)messages typically are sent through multiple SMTP systems while going from the sender to the recipient
B)the SMTP sender remains responsible for a message until it has been delivered to the recipient
C)SMTP does not guarantee that all messages are delivered
D)SMTP attempts to send messages until the recipients become available
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
In general,public and Internet mail systems offer access to a wider range of services and more robust applications.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
MIME subtypes of the multi-part type are used to describe how the different parts of a message go together.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
When HTTPS is used,which element of the communication is encrypted?

A)URL of the requested document
B)contents of the document
C)cookies sent from browser to server
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
The ________ works on behalf of user actors and user applications and is their representative within the e-mail service.

A)MUA
B)MHS
C)MSA
D)MTA
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
A(n)_________ is an Internet e-mail provider.

A)POP
B)ADMD
C)DNS
D)IEP
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
________ defines a format for text messages that are sent using e-mail.

A)RFC 208
B)RFC 1939
C)RFC 137
D)RFC 822
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
When using HTTP,a network data object or service that can be identified by a URL is called a ____________.

A)client
B)server
C)host
D)resource
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following types of intermediate devices can be used in an HTTP network?

A)proxies
B)gateways
C)tunnels
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
The term "multimedia" refers to four distinct types of media: text,graphics,video,and ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
VoIP,streaming audio,and streaming video are considered _________ applications even though each involves a single media type.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
The _________ is fundamentally a client / server application running over the Internet and TCP / IP intranets.

A)World Wide Web
B)ADMD
C)MDA
D)Hypertext Transfer Protocol
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
The ________ service supports the communication of individual pictures,charts,or drawings.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
The ________ relays mail for one application-level hop.

A)MSA
B)MS
C)MTA
D)MDA
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
The ________ is a directory lookup service that provides a mapping between the name of a host on the Internet and its numerical address.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
When using HTTP,an application program that accepts connections in order to service requests by sending back responses is called a ___________.

A)client
B)server
C)host
D)resource
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
When using HTTP,an application program that establishes connections for the purpose of sending requests to a server is called a __________.

A)client
B)server
C)host
D)resource
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
The ________ service carries sequences of pictures in time,in essence,making use of a sequence of raster-scan images.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
________ refers to the combination of HTTP and SSL to implement secure communication between a Web browser and a Web server.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
The _________ accepts the message submitted by an MUA and enforces the policies of the hosting domain and the requirements of Internet standards.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
________ is the protocol used for transfer of mail from a user agent to an MTA and from one MTA to another.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
________ media refers to multimedia files that begin playing immediately or within seconds after it is received by a computer from the Internet or Web,thus the media content is consumed as it is delivered from the server rather than waiting until an entire file is downloaded.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
SSL provides three categories of security: confidentiality,message integrity,and ___________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
HTTP is a ________ protocol; each transaction is treated independently.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
The ________ and the Internet Message Access Protocol support retrieval of mail between a client system and a server that holds the mail for the client.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
The five header fields defined in MIME are: MIME version,content-type,content-transfer-encoding,content-ID,and ___________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
A ________ is an intermediary program that acts as both a server and a client for the purpose of making requests on behalf of other clients.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
A _______ is a network data object or service that can be identified by a URL.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.