Quiz 2 -

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

____________ is not an important middleware standard.

Asynchronous Transfer Mode (ATM)

The Simple Mail Transfer Protocol is the least commonly used e-mail standard. (T/F)

False

Each server on a network that needs to act as a web server needs an application layer software package called a (n) ______________. a) browser b) application web c) web server d) operating system e) none of the above

Web server

In this type of cloud model, the cloud provider manages the hardware, while the organization is responsible for everything else.

Infrastructure as a Service

In a ___________ architecture, computers are both client and server, thus sharing the work. a) Host-based b) Client-based c) Client-server d) Peer-to-peer e) Network

Peer-to-peer

A "thick client" architecture approach:

Places all or almost all application logic on the client

A "thin client" architecture approach:

Places all or almost all of the application logic on the server

In the three tier architecture, the software on the client computer is responsible for the ____________. a) presentation logic b) application logic c) data access logic d) data storage e) application storage

Presentation logic

One of the most frequently used Telnet applications is

PuTTY

Your typical web browsing scenario where a person using a web browser accesses a web page from a server on the Internet is a good example of a client-server application architecture.(T/F)

True

To get a page from the Web, a user must type in a URL, which stands for:

Uniform Resource Locator

• The standards H.320, H.323, and MPEG-2 are commonly used with a) Telnet b) Videoconferencing c) Email d) IM e) Microsoft Office

Videoconferencing

To interact with the World Wide Web, a client computer needs an application layer software package called a:

Web browser

An N-Tiered architecture

is generally more "scalable" than a three-tiered architecture

In a host-based system with a mainframe, upgrades to the host are _____________. a)small b)cheap c)lumpy D)never going to happen E)always performed annually

lumpy

In a client-server network, _________ gets software from different vendors to work together. a. a front-end processor b. serverware c. middleware d. centerware e. programmer

middleware

One disadvantage of the ____________ architecture is that places a greater load on the network. a. two-tier b. three tier c. one-tier d. n-tier e. layered

n-tier

IMAP (Internet Message Access Protocol): a. is a set of standards that define how email is to be processed between mail servers b. is exactly the same as SMTP c. copies an e-mail message from the client computer's hard disk, deletes it from the client, and stores it on the mail server d. is exactly the same as POP e. permits an e-mail message to remain stored on the mail server even after they have been read by a client computer

permits an e-mail message to remain stored on the mail server even after they have been read by a client computer

With the two-tier client-server architecture, the client is responsible for the ________ logic. a) application b) presentation c) data access d) session e) physical

presentation

________ is the presentation of information to the user and the acceptance of the user's commands. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage

presentation logic

The ________________ cloud deployment model provides the highest levels of control, privacy and security.

private

There are optional and required parts of an HTTP request. They are: a. request address, request body b. request address, request header, request body c. request line, request header d. request line, request body e. request line, request header, request body

request line, request header, request body

There are required and optional parts of an HTTP response. They are:

response status, response header, response body

With the "thin client" architecture, when an application changes, only the _________ with the application logic needs to be updated. a. client b. server c. middleware d. hardware e. software

server

A ________ is a group of computers linked together so that they act as one computer. a. workstation b. transaction terminal c. server farm d. network computer e. transaction terminal

server farm

How are the application architecture functions split up in a client-server network? a. the presentation logic and data storage are on the client, while the data access logic is on the server b. the data storage, data access, and presentation logic are on the client c. the presentation logic is on the client, while the data storage and data access logic are on the server d. the data storage and data access logic are on the client, while the presentation logic are on the server e. the presentation logic and data access logic are on the client, and the data storage is on the server the presentation logic is on the client, while the data storage and data access logic are on the server

the presentation logic is on the client, while the data storage and data access logic are on the server

Which of the following is not a general function by any application program?

application access storage

A(n) __________ is the way in which the functions of the application layer software are spread among the clients and servers in the network. a. anonymous FTP b. data access logic c. fat client d. application architecture e. response status architecture

application architecture

______________, or the algorithms or business logic programmed into the application, can be simple or complex depending on the application. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage

application logic

With a client-based network, one fundamental problem is that: a. the clients each must store all the data b. the server does not have any data storage capability c. the host or server must perform presentation logic, application logic, and data access logic at the same time d. all data on the server must travel to the client for processing e. the clients must perform the data storage logic

All data on the server must travel to the client for processing

An application program function is __________, or the processing required to access data. a) data storage b) data access logic c) application logic d) presentation logic e) application access storage

Data Access Logic

_________ is an application program function that deals with storing and retrieving data. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage

Data storage

With respect to costs for a client-server network, which of the following is true? a. Personal computers used as clients in a client-server network cost about the same as mainframes for the same amount of computing power. b. More network capacity, which costs more money, is required for client-server networks than for client-based networks. c. Experts believe that client server architectures can be complex, but that developing application software for host based architectures is usually cheaper. d. Updating the network with new version of software tends to be less expensive in a client-server network since the software is centralized in one client. e. None of the above

Experts believe that client server architectures can be complex, but that developing application software for host based architectures is usually cheaper

(T/F) A "thin client" approach places most of the application logic on the client.

False

(T/F) A request header for an HTTP request starts with a command, such as GET, and ends with the HTTP version number that the browser understands.

False

(T/F) All three parts (request line, request header, request body) of an HTTP request from a web browser to a web server are required when a request is made.

False

(T/F) An application architecture is the way in which the functions of the application layer are performed solely by the clients in the network.

False

(T/F) As the demand for more and more network applications grow; host-based computing becomes the best solution.

False

(T/F) Host-based and client-based networks are similar in that the client computer performs most of the work.

False

(T/F) The application architecture called the distributed computing model uses the "thick" client approach

False

(T/F) The earliest data communications networks were client-server networks.

False

(T/F) The standard protocol for communication between a Web browser and a Web server is the web protocol.

False

(T/F) The two-tier e-mail architecture does not require any application software on the client computer.

False

(T/F) To use the Web, each client computer requires a data link layer software package called a Web browser.

False

(T/F) Using the POP standard for client to server e-mail communication, the e-mail messages remain on the server computer.

False

(T/F)The World Wide Web was conceived at University of Utah as part of the development of the Internet.

False

The acronym, HTML, refers to

Hypertext Markup Language

The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called the _____________________. a. Hypertext Transfer Protocol b. File Transfer Protocol c. Simple Mail Transfer Protocol d. Internet Message Access Protocol e. Hyperlink Transfer Protocol. Hypertext Transfer Protocol

Hypertext Transfer Protocol

Which of the following is not an advantage of instant messaging? a) It usually takes days for an IM message to be delivered to the recipient. b) It allows real time typed messages to be exchanged. c) Some products are ICQ and AOL Instant Messenger. d) It is generally faster than snail-mail. e) It helps people avoid telephone tag.

It usually takes days for an IM message to be delivered to the recipient.

The software that runs on the mail server is referred to as the ____________

Mail Transfer Agent

In a two-tier client-server architecture, a client computer needs to use an application layer software package called a ________________ to send e-mail: a. message transfer agent b. router agent c. mail user agent d. Webcast package e. gateway agent

Mail User agent

Which of the following is not an example of a mail user agent software package?

Microsoft word

Marc Andreessen led a team that developed the first graphical Web browser, which was called: a) internet explorer b) mosaic c) firebird d) netscape navigator

Mosaic

The acronym, MIME, refers to: a. Multimedia Internet Mail Enterprise b. Multiple Internet Media Extension c. Multipurpose Internet Mail Extension d. Media Internet Mail Extension e. Multimedia Internet Mime Extension

Multipurpose Internet Mail Extension

Which of the following is not true about Telnet?

Telnet poses no security threat.

A response status code of 404 means: a) the requested page was not found b) the server is currently unavailable c) the sever is currently busy d) your browser is incompatible with the Web server software. e) your browser needs to be updated to the latest version

The requested page was not found

The idea for a special hypertext network, called the World Wide Web, was conceived of by: a. Microsoft in 1994 as part of the Windows 95 project b. Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1989 c. Vinton Cerf, for the U.S. Department of Defense in 1969 as a network of four computers called ARPANET d. Howard Flieshman of IBM in 1982 as part of the development of the IBM PC e. the University of Minnesota as an extension of Gopher

Tim Berners-Lee at the European Laboratory for Particle Physics CERN in 1989

(T/F) A server farm is a group of computers that are linked together so they act as a one computer.

True

(T/F) Cloud-hosted virtual desktops are now available through a service called DaaS allowing users to access the same client computer (virtual desktop) from any computer and any location.

True

(T/F) In a client-server network, the presentation logic is the responsibility of the client computer.

True

(T/F) Middleware is the software that sits between the application software on the client and the application software on the server.

True

(T/F) Scalability refers to the ability to increase or decrease the capacity of the computing infrastructure in response to changing capacity needs.

True

(T/F) The four general functions of any application program are: data storage, data access logic, application logic and presentation logic.

True

(T/F) The two functions of middleware are to: 1) provide a standard way of communicating that can translate between software from different vendors, and 2) manage the message transfer between clients and servers so that clients do not need to 'know' which server contains the application's data.

True

(T/F) Web-based e-mail like Hotmail is an example of three-tier client-server architecture that provides access to e-mail messages.

True

(T/F)In the three-tier architecture, the software on the client computer is responsible for the presentation logic, an application server is responsible for the application logic and a separate database server is responsible for the data access logic and data storage.

True

The fundamental problem in client-based networks is that all data on the server must travel to the client for processing. (T/F)

True

The most commonly used e-mail standard is: a) Simple Mail Transfer Protocol b) X.400 c) CMC d) Post Office Protocol e) Telnet

a) Simple Mail Transfer Protocol

Client-server architectures: a) cannot connect computers that use different hardware b) are one of the least used network architectures today c) can use middleware to provide a standard way of communicating between software from more than one vendor d) assign the responsibility for the presentation logic to the server e) were the earliest type of network architectures

can use middleware to provide a standard way of communicating between software from more than one vendor

The ________________ clouds realize the benefits from cloud infrastructure (such as speed of deployment) with the added level of privacy and security that private clouds offer.

community

What technique is used by most videoconferencing applications to reduce the amount of data being transmitted? a) hashing b) encryption c) authentication d) identification e) compression

compression

Another term for a mail user agent is:

email client

One underlying problem with a host-based network is that: a. there are economies of scale because all computer resources are centralized b. the server can get overloaded since it must process all messages c. the architecture is relatively simple and works well d. the server is the one point of control which simplifies security e. clients (terminals) do not require sophisticated hardware/software because they do not perform most of the work in this type of architecture

the server can get overloaded since it must process all messages

A(n) _________-tiered architecture uses only two sets of computers: one set of clients and one set of servers. a. one b. two c. three d. five e. n

two

_________ is a special type of one directional; videoconferencing in which content is sent from the server to the user. a. broadcasting b. instant messaging c. webcasting d. H.323 e. Net Meeting.

webcasting


Ensembles d'études connexes

Exam 2: Special supplemental nutrition program for Women, Infants, and children

View Set

Psychology, Chapter 7, Long-Term Memory: Encoding and Retrieval

View Set

Constitutional Law Test 2 (Chapters 4-6)

View Set

Sociology of Sport Mid-Term Study Guide - Richardson

View Set

Civil Rights Movement - Chronological

View Set