Quiz 2 - IT Infrastructure and Internet

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The process of presenting a set of computing resources (such as computing power or data storage) so that they can all be accessed in ways that are not restricted by physical configuration or geographic location is called multicore processing. cloud computing. autonomic computing. ubiquitous computing. virtualization.

virtualization.

The most appropriate wireless networking standard for creating PANs is Bluetooth. Wi-Fi. RFID. I-mode. IEEE 802.11b.

Bluetooth.

Which device sends data packets to all connected devices in a network? Network interface card Hub Router Switch None of the above.

Hub

Which of the following statements is not true about search engines? They have solved the problem of how users instantly find information on the Internet. Users are increasingly using search engines on mobile devices. They are arguably the Internet's "killer app." There are hundreds of search engines vying for user attention, with no clear leader having yet emerged. They are monetized almost exclusively by search engine marketing.

There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

In the domain name "http://myspace.blogging.com", what are the root, top-level, second-level, and third-level domains, respectively? "http://", myspace, blogging, com "http://", com, blogging, myspace ".", com, blogging, myspace ".", myspace, blogging, com

".", com, blogging, myspace

What are the four layers of the TCP/IP reference model? Physical, application, transport, and network interface Physical, Application, Internet, and Network Interface Application, Transport, Internet, and Network Interface Application, Hardware, Internet, and Network Interface Software, Hardware, Network Interface, Internet

Application, Transport, Internet, and Network Interface

Which of the following is a leading networking hardware provider? Intel Cisco Seagate IBM Dell

Cisco

What service converts IP addresses into more recognizable alphanumeric names? DNS HTML FTP IP HTTP

DNS

The network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers is ASCII Ethernet TCP/IP COBOL Linux

Ethernet

Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching

False

IT infrastructure consists of just those physical computing devices required to operate the enterprise.

False

Web browser software requests Web pages from the Internet using which protocol?

HTTP

Which organization helps define the overall structure of the Internet? The Department of Commerce (U.S.) ICANN none (no one "owns" the Internet) W3C IAB

IAB

________ takes place when a firm contracts custom software development or maintenance of existing legacy programs to outside firms. On-demand computing Utility computing Consumerization of IT Outsourcing Cloud computing

Outsourcing

Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents? Wireless network in infrastructure mode Domain-based LAN Peer-to-peer network Campus area network

Peer-to-peer network

What technology allows people to have content pulled from Web sites and fed automatically to their computers? FTP IPv6 HTTP Bluetooth RSS

RSS

Which protocol is the Internet based on? Packet-switching Circuit-switching Frame relay FTP TCP/IP

TCP/IP

The most important communication standard today for linking disparate computers and networks is: Transmission Control Protocol/Internet Protocol (TCP/IP). International Standards Organization (ISO). Open Systems Interconnection (OSI). File Transfer Protocol (FTP).

Transmission Control Protocol/Internet Protocol (TCP/IP).

An application server may reside on the same computer as a Web server or on its own dedicated computer.

True

Every computer on the Internet is assigned a unique Internet Protocol (IP) address.

True

In a client/server network, a network server provides every connected client with an address so it can be found by others on the network.

True

Java software is designed to run on any computing device, regardless of the specific microprocessor or operating system it uses.

True

The collection of Web services that are used to build a firm's software systems constitutes what is known as a service-oriented architecture.

True

Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.

True

The multitasking, multi-user, operating system developed by Bell Laboratories that operates on a wide variety of computing platforms is: COBOL DOS Linux Unix OS X

Unix

All of the following are current hardware platform trends except: green computing. virtualization. cloud computing. Unix. quantum computing.

Unix.

Which technology uses the Internet Protocol to deliver voice information in digital form using packet switching? TCP/IP VPN VoIP None, voice information is digitally delivered using ATM

VoIP

The Internet is based on the following three key technologies: TCP/IP, HTML, HTTP. TCP/IP, HTTP, and packet switching. client/server computing, packet switching, and the development of widely used communications standards for linking networks and computers. client/server computing, packet switching, and HTTP.

client/server computing, packet switching, and the development of widely used communications standards for linking networks and computers.

Which of the following is not considered a defining feature of Web 2.0? interactivity real-time user control social participation cloud computing User-generated content

cloud computing

Interpretations of Moore's law assert that: computing power doubles every 18 months. computing power will eventually level off. data storage costs decrease by 50% every 18 months. PCs decrease in market share by 9% every 5 years. ransistors decrease in size 50% every two years.

computing power doubles every 18 months.

Software that manages the resources of the computer is called application software. partitioning software. data management software. network software. operating system software.

operating system software.

The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called: packet switching. circuit switching multiplexing. packet routing. ATM.

packet switching.

What is the main concern of using Wi-Fi for wireless networking in business. capacity: the speed of data transmission is too slow for Wi-Fi. security: Wi-Fi wireless networks are vulnerable to intruders. cost: it is too expensive to set up a Wi-Fi system either in the infrastructure mode or the ad hoc mode. popularity: today most laptops do not have wireless NICs to receive Wi-Fi signals.

security: Wi-Fi wireless networks are vulnerable to intruders.

A device that acts as a connection point between computers and can filter and forward data to a specified destination is called a: hub. switch. router. NIC. None of the above

switch.

The Internet is based on client/server technology in which: the data, such as e-mail messages and web pages, resides on servers. the data of e-mail messages normally resides on client computers. applications reside on servers and all data resides on client computers. all data resides on servers and applications reside on client computers.

the data, such as e-mail messages and web pages, resides on servers.


Ensembles d'études connexes

Crusades, World History, Period 3

View Set

Ch 23: Management of Patients with Chest and Lower Respiratory Tract Disorders

View Set

Physics 100-Chapter 22 questions

View Set

pathophysiology class 1 cellular adaptation

View Set

Introduction to Marketing Chapter 10

View Set